The host is installed with Apple Mac OS 10.8 before 10.13 and is prone to a read after free vulnerability. A flaw is present in the application, which fails to properly handle stress while closing multiple connections. Successful exploitation allows remote attackers to access memory after it has been freed.