The host is installed with Google Chrome before 27.0.1453.93 and is prone to use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to the handling of Pepper resources. Successful exploitation allows attackers to cause a denial of service or possibly have unspecified other impact.