VYPR
Unrated severityNVD Advisory· Published Jul 3, 2015· Updated May 6, 2026

CVE-2015-3719

CVE-2015-3719

Description

TrueTypeScaler in FontParser in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-3694.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apple iOS before 8.4 and OS X before 10.10.4 FontParser memory corruption allows remote code execution via crafted font file.

Vulnerability

A memory corruption vulnerability exists in the TrueTypeScaler component of FontParser in Apple iOS (before 8.4) and OS X (before 10.10.4). It is triggered when processing a crafted font file [1][2]. This vulnerability is distinct from CVE-2015-3694.

Exploitation

An attacker can exploit this vulnerability remotely by delivering a malicious font file to the target, such as through a web page or email. The user only needs to view the content that causes the font to be processed; no authentication is required.

Impact

Successful exploitation leads to arbitrary code execution or denial of service (memory corruption). An attacker may execute arbitrary code with the privileges of the application processing the font, potentially leading to full system compromise.

Mitigation

Apple addressed the issue in iOS 8.4 and OS X Yosemite v10.10.4 and Security Update 2015-005, released on June 30, 2015 [1][2]. Users should update their devices to the latest available versions.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.