The host is installed with Apple Mac OS 12 before 12.4 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle an input validation issue. On successful exploitation, a remote attacker may be able to cause unexpected application termination or arbitrary code execution.