The host is installed with Microsoft Access 2007, 2010 or 2013 and is prone to an access memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to corrupt memory.