The host is installed with Apple QuickTime and is prone to heap based overflow vulnerability. A flaw is present in the application, which fails to handle a file permission. Successful exploitation allow local user can access potentially sensitive information.