This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the way Adobe Reader handles Compound Glyphs. It is possible for an compound glyph to reference another compound glyph. When this happens the Reader fails to correctly count the number of child glyphs. The result is that the code reads a value from outside an array of valid values. This value is used as a counter for a loop that copies memory. This could result in remote code execution under trhe context of the current user.