The host is installed with Apple iCloud before 7.1 or Apple iTunes before 12.7.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle maliciously crafted web content. Successful exploitation could allow attackers to arbitrary code execution.