The host is installed with Apple iTunes before 12.9.6 or Apple iCloud before 7.13 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to properly handle multiple memory corruption issues. Successful exploitation could allow attackers to execute arbitrary code through maliciously crafted web content.