A remote attacker could exploit the vulnerability simply by sending an email.
Source: Threadpost