The host is installed with Apple Mac OS X 10.8.5 or OS X 10.9.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle JPEG images. Successful exploitation allows attackers to lead to an unexpected application termination or arbitrary code execution.