Adobe Reader '/Registry' and '/Ordering' Buffer Overflow Vulnerability (Win)

Summary
This host is installed with Adobe Reader and is prone to buffer overflow vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary code. Impact Level: System/Application
Solution
Apply the patch from the below link ftp://ftp.adobe.com/pub/adobe/acrobat/win/4.x/ac405up2.exe NOTE : Ignore this warning, if above mentioned patch is already applied.
Insight
The flaw is due to the program fails to validate the '/Registry' and '/Ordering' strings
Affected
Adobe Reader version 4.0.5 and before on Windows.
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References