Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart Independent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010.
As we recently covered on Planet PDF, most security exploits of PDFs are able to thrive because of the large numbers of PDF users who have not yet upgraded to the latest versions of Adobe Reader and Adobe Acrobat, which contain fixes for these security exploits.
The exploit covered in CVE-2010-2883 has been patched in the latest versions of Adobe Acrobat and Adobe Reader, available from the Adobe website.
Thanks to Magazinify.com, it's possible to have web articles delivered right to your inbox in PDF form. If that weren't enough, the nice folks at CNET have been nice enough to publish a step-by-step guide about how to set this all up using just a little time and a free Magazinify account.
OK, so you want to stamp your document. Maybe you need to give reviewers some advice about the document's status or sensitivity. This tip from author Ted Padova demonstrates how to add stamps with the Stamp Tool along with related comments.