A remote code execution vulnerability exists when Microsoft Office fails to validate the authenticity of a module before loading it at run-time. An attacker who successfully exploited the vulnerability could execute arbitrary code in the context of the user running the affected application.
Apply associated Trend Micro DPI Rules.