The host is installed with Microsoft Office 2007 or Microsoft Word Viewer and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle objects in memory. Successful exploitation could allow attackers to perform actions in the security context of the current user.