The host is installed with Apple iTunes before 12.10.2 or Apple iCloud before 7.15 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to properly handle a memory corruption issue. Successful exploitation could allow attackers to execute arbitrary code via maliciously crafted web content.