The host is installed with Apple Mac OS X or Server 10.8.5 or OS X 10.9 through 10.9.4 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted application. Successful exploitation allows attackers to execute arbitrary code in a privileged context.