Improper input validation in Microsoft Office Word allows an unauthorized attacker to bypass a security feature over a network.
The product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.