CVE-2015-1093
Description
FontParser in Apple iOS before 8.3 and Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory corruption bug in Apple's FontParser allows remote code execution via a crafted font file on iOS before 8.3 and OS X before 10.10.3.
Vulnerability
The vulnerability resides in the FontParser component of Apple iOS (prior to 8.3) and OS X (prior to 10.10.3). A memory corruption issue exists in the processing of font files, which can be triggered by a specially crafted font. The affected versions include iOS 8.0 through 8.2 and OS X Yosemite v10.10 through v10.10.2 [1][2][3].
Exploitation
An attacker can trigger the vulnerability by convincing a user to open a malicious font file, for instance, by visiting a compromised website or opening a crafted email attachment. No special network position or authentication is required beyond standard user interaction. The attack vector involves delivering a malformed font that is parsed by FontParser, leading to memory corruption.
Impact
Successful exploitation allows a remote attacker to execute arbitrary code on the target system or cause a denial of service via memory corruption. The code execution occurs in the context of the application processing the font, which could be a WebKit process or other system component. This can lead to full system compromise on both iOS and OS X devices.
Mitigation
Apple addressed the issue in iOS 8.3 (released April 8, 2015) and OS X Yosemite v10.10.3 (released April 8, 2015), as detailed in their security advisories [1][2]. The vulnerability is also fixed in Watch OS 1.0.1 [3]. Users should update to the latest available versions. No workarounds are documented; applying the security updates is the only mitigation.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
4- Range: <8.3
- Range: <10.10.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- lists.apple.com/archives/security-announce/2015/Apr/msg00001.htmlnvdMailing ListVendor Advisory
- lists.apple.com/archives/security-announce/2015/Apr/msg00002.htmlnvdMailing ListVendor Advisory
- www.securityfocus.com/bid/73984nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1032048nvdThird Party AdvisoryVDB Entry
- support.apple.com/HT204659nvdVendor Advisory
- support.apple.com/HT204661nvdVendor Advisory
- support.apple.com/kb/HT204870nvdVendor Advisory
News mentions
0No linked articles in our index yet.