The host is installed with Microsoft Office 2007 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle objects in memory. Successful exploitation could allow attackers to perform actions in the security context of the current user.