The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to improper validation vulnerability. A flaw is present in the application, which fails to properly handle a pointer from userspace. Successful exploitation allows attackers to take control of the system.