The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly interact with extensions. Successful exploitation will allow the attackers to cause a denial of service condition using a crafted extension that triggers an uninitialized pointer.