Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6795
https://exchange.xforce.ibmcloud.com/vulnerabilities/54747
https://bugzilla.redhat.com/show_bug.cgi?id=547799
http://www.vupen.com/english/advisories/2010/0103
http://www.vupen.com/english/advisories/2009/3518
http://www.us-cert.gov/cas/techalerts/TA10-013A.html
http://www.symantec.com/connect/blogs/zero-day-xmas-present
http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214
http://www.securityfocus.com/bid/37331
http://www.redhat.com/support/errata/RHSA-2010-0060.html
http://www.kb.cert.org/vuls/id/508357
http://www.adobe.com/support/security/bulletins/apsb10-02.html
http://www.adobe.com/support/security/advisories/apsa09-07.html
http://secunia.com/advisories/38215
http://secunia.com/advisories/38138
http://secunia.com/advisories/37690
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html
http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html