which could be exploitedby attackers to take complete control of an affected system or cause adenial of service. These flaws are due to memory corruption errors whenhandling a malformed presentation, which could be exploited byattackers to crash a vulnerable application or execute arbitrarycommands by tricking a user into opening a specially crafted ".ppt"file.
Note : Proof of concept exploits have been published.