Adobe has published a security bulletin ("Security Advisory for Adobe Reader and Acrobat", CVE-2011-2462) regarding a vulnerability in Adobe Reader and Acrobat that can allow an attacker to perform remote code execution and gain control of vulnerable hosts. Complete information from Adobe is available at http://www.adobe.com/support/security/advisories/apsa11-04.html.
In response to this disclosure, Palo Alto Networks has released an emergency content update (version 281, released 12/7/11) that provides detection of attempted exploitation of the vulnerability described in this security bulletin. The following signatures have been added: Signature 34562 ("Adobe Reader U3D Memory Corruption Vulnerability") and 34563 ("Adobe Reader U3D Memory Corruption Vulnerability").
Palo Alto Networks customers with a Threat Prevention subscription are advised to verify that they are running the latest content version on their devices. If you have any questions about coverage for this advisory, please contact support.