The host is installed with Apple Mac OS X or Server 10.11.6 and is prone to multiple memory corruption vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to execute arbitrary code with kernel privileges.