The host is installed with Microsoft Office 2016 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to run arbitrary code in the context of the current user.