The host is installed with Microsoft InfoPath 2007, InfoPath 2010 or InfoPath 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory. Successful exploitation allows attackers to run arbitrary code in the context of the current user.