The host is installed with Google Chrome before 32.0.1700.76 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to the shutting down of a worker process. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.