The host is installed with Google Chrome and is prone to denial of service vulnerability. A flaw is present in the browser, which fails to handle layering code resulting in stale pointers. Successful exploitation could allow remote attackers to execute remote code or cause denial of service.