Memory corruption can be used for hidden malware installation.
vulners.com/securityvulns/securityvulns:doc:13140