The host is installed with Apple Mac OS X or Server 10.7.5, 10.8.5, 10.9 or 10.9.1 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Successful exploitation allows man-in-the-middle attackers to spoof arbitrary SSL servers.