The host is installed with Microsoft Word 2007 or Microsoft Office Compatibility Pack and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory while parsing specially crafted Office files. Successful exploitation allows attackers to run arbitrary code in the context of the current user.