The host is installed with Apple QuickTime before 7.7 and is prone to multiple memory corruption vulnerabilities. A flaw is present in the application which fails to properly handle JPEG2000 images.Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.