The host is installed with Apple Mac OS X or Server before 10.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not ensure that a Kerberos ticket is in the cache for the correct user. Successful exploitation allows attackers to gain privileges in opportunistic circumstances.