CVE-2015-5755
Description
CoreText in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-5761.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apple CoreText font parsing vulnerability allows remote code execution via crafted font in iOS and OS X.
Vulnerability
A memory corruption vulnerability exists in Apple CoreText's processing of font files, affecting iOS before 8.4.1 and OS X before 10.10.5 [1][2]. A remote attacker can trigger the flaw by providing a specially crafted font file, leading to arbitrary code execution or application crash. This CVE CVE-2015-5755 is distinct from the related CVE-2015-5761 [2][3].
Exploitation
To exploit this vulnerability, an attacker must deliver a malicious font file to the target system. This can be achieved through various vectors such as a webpage, email attachment, or bundled in a document. No special privileges are required beyond standard user interaction (e.g., opening the file or viewing content that processes the font). CoreText automatically parses the font, triggering memory corruption without additional user actions after initial access [1][2].
Impact
Successful exploitation allows an attacker to execute arbitrary code in the context of the current user, potentially gaining full control of the affected system. Alternatively, the corruption can cause a denial of service through application crash or unexpected termination. The impact is limited by the privilege level of the user, but for most scenarios it enables complete compromise of the device or application [1][2][3].
Mitigation
Apple released security updates to address this vulnerability: OS X Yosemite v10.10.5 (and Security Update 2015-006 for Mavericks) resolves the issue on OS X [1], while iOS 8.4.1 patched it on iPhones, iPads, and iPod touches [2]. Additionally, iTunes 12.3 on Windows includes a fix for applications using CoreText [3]. Users should update to these versions or later. No workarounds were disclosed for unpatched systems.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
5- Range: <8.4.1
- Range: <10.10.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- lists.apple.com/archives/security-announce/2015/Sep/msg00003.htmlnvdPatchVendor Advisory
- lists.apple.com/archives/security-announce/2015/Aug/msg00001.htmlnvdVendor Advisory
- lists.apple.com/archives/security-announce/2015/Aug/msg00002.htmlnvdVendor Advisory
- support.apple.com/HT205221nvdVendor Advisory
- support.apple.com/kb/HT205030nvdVendor Advisory
- support.apple.com/kb/HT205031nvdVendor Advisory
- www.securityfocus.com/bid/76343nvd
- www.securitytracker.com/id/1033275nvd
News mentions
0No linked articles in our index yet.