The host is installed with Apple Safari web browser and is prone to denial of service.
Successful exploitation allow attackers to execute arbitrary code or can even crash the browser. Impact Level: Application
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one. For updates refer to http://www.apple.com/support/downloads/
The flaw is due to WebKit library which fails to validate the user input via a long ALINK attribute in a BODY element in an HTML document.
Apple Safari 3.2 and prior on Windows (Any).