This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Office. Exploitation requires that the attacker coerce the target user into opening a malicious .PPT file. The specific flaw exists during the parsing of a malformed slide notes field within the PowerPoint presentation. When PowerPoint attempts to rebuild the malformed section, a pointer calculation is made based on attacker controlled data from within the file. This pointer is later dereferenced and can lead to arbitrary code execution with the privileges of the user who opened the malicious file.