The host is installed with Apple iCloud before 7.10 or Apple iTunes before 12.9.3 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to perform arbitrary code execution.