Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
https://exchange.xforce.ibmcloud.com/vulnerabilities/54747
https://bugzilla.redhat.com/show_bug.cgi?id=547799
http://www.us-cert.gov/cas/techalerts/TA10-013A.html
http://www.kb.cert.org/vuls/id/508357
http://www.adobe.com/support/security/bulletins/apsb10-02.html
http://www.adobe.com/support/security/advisories/apsa09-07.html
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html