Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart Independent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010.
As we recently covered on Planet PDF, most security exploits of PDFs are able to thrive because of the large numbers of PDF users who have not yet upgraded to the latest versions of Adobe Reader and Adobe Acrobat, which contain fixes for these security exploits.
The exploit covered in CVE-2010-2883 has been patched in the latest versions of Adobe Acrobat and Adobe Reader, available from the Adobe website.
OK, so you want to stamp your document. Maybe you need to give reviewers some advice about the document's status or sensitivity. This tip from author Ted Padova demonstrates how to add stamps with the Stamp Tool along with related comments.