The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly process plugins and allows out-of-bounds reads to occur. Successful exploitation allows remote attackers to cause a denial of service condition using unspecified vectors.