The host is installed with Apple iTunes before 12.9.5 or Apple iCloud before 7.12 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle an input validation issue. Successful exploitation could allow attackers to execute arbitrary code through maliciously crafted web content.