A vulnerability has been reported in Microsoft Word which could be exploited by an attacker to take complete control of the system.
The attacker could exploit this vulnerability by creating and sending specially crafted word document to the affected user and could persuade user into opening the document and could execute the arbitrary commands to take complete control of the affected system.
The information provided herein is on "as is" basis, without warranty of any kind.