source: https://www.securityfocus.com/bid/28146/info

Microsoft Office is prone to a remote memory-corruption vulnerability.

An attacker could exploit this issue by enticing a victim to open a malicious Office file.

Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user. 

https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31361.tgz