The host is installed with Microsoft Office Excel 2002 and is prone to remote code execution vulnerability. A flaw is present in the application, where it is not able to handle special crafted excel files. Successful exploitation allows remote attacker to take complete control of the affected system.