The getAnnots Doc method in the JavaScript API in Adobe Reader and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that contains an annotation, and has an OpenAction entry with JavaScript code that calls this method with crafted integer arguments.
https://www.exploit-db.com/exploits/8569
https://exchange.xforce.ibmcloud.com/vulnerabilities/50145
http://www.vupen.com/english/advisories/2009/1317
http://www.vupen.com/english/advisories/2009/1189
http://www.us-cert.gov/cas/techalerts/TA09-133B.html
http://www.securitytracker.com/id?1022139
http://www.redhat.com/support/errata/RHSA-2009-0478.html
http://www.kb.cert.org/vuls/id/970180
http://www.adobe.com/support/security/bulletins/apsb09-06.html
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=926953
http://security.gentoo.org/glsa/glsa-200907-06.xml
http://secunia.com/advisories/35734
http://secunia.com/advisories/35416
http://secunia.com/advisories/35358
http://secunia.com/advisories/35152
http://secunia.com/advisories/35096
http://secunia.com/advisories/35055
http://secunia.com/advisories/34924
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00001.html
http://blogs.adobe.com/psirt/2009/05/adobe_reader_issue_update.html
http://blogs.adobe.com/psirt/2009/04/update_on_adobe_reader_issue.html
http://blogs.adobe.com/psirt/2009/04/potential_adobe_reader_issue.html