The host is installed with Apple iTunes before 12.9 or Apple iCloud before 7.7 and is prone to a use after free vulnerability. A flaw is present in the application, which fail to properly handle crafted content. Successful exploitation could allow attackers to execute arbitrary code.