This vulnerability allows remote attackers to execute arbitrary code in the context of the logged in user. An array boundary condition may be violated by a malicious Microsoft Office (DOC/PPT/XLS) file in order to redirect execution into attacker-supplied data. Exploitation requires that the attacker coerce or persuade the victim to open a malicious Microsoft Office file.
557ac5b561185b4409b354703022b4e5b04b1b7d390dcc2fe8ee31074e5ded9d