The host is installed with Apple QuickTime before 7.7 and is prone to memory corruption vulnerability. A flaw is present in the application which fails to properly handle sample tables in QuickTime movie files. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.