The host is installed with Microsoft PowerPoint or Office Compatibility Pack and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to handle presentation memory while reading malicious PowerPoint files. Successful exploitation allows remote attackers to corrupt memory and execute arbitrary code.