The host is installed with Google Chrome browser, and is prone to a use-after-free vulnerability. A flaw is present in the image loader component of the browser, which fails to validate malicious requests. Successful exploitation could allow an attacker crash the service or cause other unknown impact.