The vulnerability affects Adobe Reader 8.1 and earlier, Adobe Reader 7.0.9 and earlier, Adobe Acrobat Professional, 3D and Standard 8.1 and earlier, Adobe Acrobat Professional, Standard, 3D and Elements 7.0.9 and earlier.
Adobe recommends that users upgrade to Adobe Reader 8.1.1 or Acrobat 8.1.1.
Adobe plans to deliver updates to Adobe Reader 7.0.9 and Acrobat 7.0.9 at a later date. In the meantime, IT administrators may choose to disable the mailto: option in Acrobat, Acrobat 3D and Adobe Reader by changing the application options in the Windows registry.
This is not the first fix Adobe has issued for Windows-based systems since the beginning of the year. A vulnerability exposed in January stems from Adobe Reader's "Open Parameters" feature that lets developers pass parameters when opening a PDF file. Adobe also spent considerable time and effort getting its software to interoperate with Windows Vista.
Building A Mobile Business MindsetAmong 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps – and it's past time for those with no plans to get cracking.