Adobe today issued a security advisory relating to a vulnerability in Adobe Acrobat and Reader. Identified as a buffer overflow within a core plug-in that is part of both products, the vulnerability could be exploited to crash the application with an increased risk of malicious code execution.
According to the Adobe advisory:
The identified vulnerability is a buffer overflow within a core application plug-in, which is part of Adobe Acrobat and Adobe Reader. If a malicious file were opened it could trigger a buffer overflow as the file is being loaded into Adobe Acrobat and Adobe Reader. A buffer overflow can cause the application to crash and increase the risk of malicious code execution.
The solution is to update to the current version. More detail on specific fixes can be found on the Adobe Website.
OK, so you want to stamp your document. Maybe you need to give reviewers some advice about the document's status or sensitivity. This tip from author Ted Padova demonstrates how to add stamps with the Stamp Tool along with related comments.