Memory corruption in RF-enbedded OLE object can be used for hidden malware installation.
vulners.com/securityvulns/securityvulns:doc:16060