A remote code execution vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited this vulnerability could take control of an affected system.
To exploit the vulnerability, an attacker would first have to log on to the target system and then run a specially crafted application.
The updates address the vulnerability by correcting how Windows handles objects in memory.