The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the application, which tries to use unavailable memory. Successful exploitation could allow an attacker to cause a denial of service condition using vectors related to image loading.