The vulnerability (or vulnerabilities) leveraged by the specially crafted document file are usually application- or platform-specific; a particular program (or even a specific version of the program) must be installed on the machine in order for the exploit to be effective.
To prevent exploitation of such vulnerabilities, please refer to the application vendor for the latest updates and additional advice.
Security programs will sometimes unintentionally identify a clean program or file as malicious if its code or behavior is similar to a known harmful program or file. This is known as a False Alarm or False Positive (FP).
In most cases, a False Positive is fixed in a subsequent database release.
Usually, updating your F-Secure security product to use the latest database is enough to resolve the issue.
If you suspect a detected file is a False Positive, you can check by first updating your F-Secure security product to use the latest detection database updates, then rescanning the file.