CVE-2011-3260
Description
Buffer overflow in OfficeImport in Apple iOS before 5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Word document.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A buffer overflow in iOS OfficeImport allows remote code execution via a crafted Word document. Fixed in iOS 5.
Vulnerability
A buffer overflow vulnerability exists in the OfficeImport component of Apple iOS versions prior to 5. The flaw can be triggered by processing a specially crafted Microsoft Word document. Affected versions include iOS 4.x and earlier; the vulnerability is addressed in iOS 5 [1].
Exploitation
An attacker can exploit this vulnerability by delivering a malicious Word document to a target user on an affected iOS device. No authentication or elevated privileges are required beyond convincing the user to open the document (e.g., via email, web download, or other means). The crafted document triggers a buffer overflow during parsing, leading to memory corruption [1].
Impact
Successful exploitation allows an attacker to execute arbitrary code on the device or cause a denial of service (application crash). The attacker gains the ability to run code within the context of the application processing the document, potentially leading to full device compromise [1].
Mitigation
Apple released iOS 5, which includes a fix for this vulnerability. Users should update their devices to iOS 5 or later via iTunes. No workarounds are provided in the available references. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities catalog as of the last update [1].
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
30cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*+ 28 more
- cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch:*:*:*:*:*
- Range: <5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- lists.apple.com/archives/Security-announce/2011//Oct/msg00001.htmlnvdVendor Advisory
- support.apple.com/kb/HT4999nvdVendor Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/70556nvd
News mentions
0No linked articles in our index yet.