The host is installed with Google Chrome before 10.0.648.127, Apple Safari before 5.0.6 or Apple iTunes before 10.5 and is prone to a memory corruption vulnerability. A flaw is present in the application, which does not properly handle counter nodes. Successful exploitation allow remote attackers to cause a denial of service (memory corruption).