The host is installed with Microsoft Word 2007, Office Compatibility Pack 2007 or Word Viewer and is prone to an use after free vulnerability. A flaw is present in the applications, which fail to handle crafted office files. Successful exploitation could allow attackers to execute arbitrary code.