The remote host is running a version of Microsoft Word which is subject to a flaw which may allow arbitrary code to be run.
An attacker may use this to execute arbitrary code on this host.
To succeed, the attacker would have to send a rogue word file to a user of the remote computer and have it open it. Then a bug in the font parsing handler would result in code execution.
Complete Confidentiality Impact, Complete Integrity Impact, Complete Availability Impact