Websense researcher Hermes Li has posted a blow-by-blow walkthrough of the Adobe Acrobat/Reader vulnerability. The vulnerability is different than the one found at the end of last year (Exploit Action with PDF OpenAction) in Adobe PDF reader. This vulnerability allows the attacker to overwrite memory with. executable shell code that uses Heap Spray technology in Javascript when parsing a specially crafted JBIG2Decode image object . Also known as Exploit Actions with PDF openAction
Source: https://threatpost.com/adobe-pdf-exploit-code-analysis-022609/72471/

