The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the browser, which fails to handle floating objects and creates a stale pointer. Successful exploitation could allow remote attackers to cause denial of service.