Heap corruptions, heap buffer overflows open possibilities for attack via different protocols and applications.
vulners.com/securityvulns/securityvulns:doc:5749
vulners.com/securityvulns/securityvulns:doc:5750
vulners.com/securityvulns/securityvulns:doc:5751
vulners.com/securityvulns/securityvulns:doc:5822