CVE-2016-1740
Description
FontParser in Apple iOS before 9.3, OS X before 10.11.4, tvOS before 9.2, and watchOS before 2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory corruption vulnerability in Apple's FontParser allows arbitrary code execution via a crafted PDF, affecting multiple Apple platforms.
Vulnerability
FontParser in Apple iOS before 9.3, OS X before 10.11.4, tvOS before 9.2, and watchOS before 2.2 contains a memory corruption issue when parsing fonts embedded in PDF documents. This allows a remote attacker to trigger arbitrary code execution or denial of service via a specially crafted PDF file. [1][2][3][4]
Exploitation
An attacker can deliver a malicious PDF document to the target user, for example via email, web download, or other means. No authentication is required; the user only needs to open the PDF in an application that uses FontParser (e.g., Preview, Safari, or any PDF viewer on the affected system). The parsing of the crafted font data triggers memory corruption, leading to code execution.
Impact
Successful exploitation allows arbitrary code execution in the context of the application processing the PDF. This could lead to full system compromise on OS X, or app sandbox escape on iOS/tvOS/watchOS. Alternatively, the attacker could cause a denial of service via application termination.
Mitigation
Apple addressed this vulnerability in iOS 9.3, OS X El Capitan v10.11.4, tvOS 9.2, and watchOS 2.2, released on March 21, 2016. Users should update their devices to these versions or later. No workarounds are documented; the only mitigation is to apply the security updates. [1][2][3][4]
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
8cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*range: <9.2
- (no CPE)range: <9.2
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*range: <2.2
- (no CPE)range: <2.2
- Range: <9.3
- Range: <10.11.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- lists.apple.com/archives/security-announce/2016/Mar/msg00000.htmlnvdMailing ListVendor Advisory
- lists.apple.com/archives/security-announce/2016/Mar/msg00001.htmlnvdMailing ListVendor Advisory
- lists.apple.com/archives/security-announce/2016/Mar/msg00002.htmlnvdMailing ListVendor Advisory
- lists.apple.com/archives/security-announce/2016/Mar/msg00004.htmlnvdMailing ListVendor Advisory
- www.securitytracker.com/id/1035353nvdThird Party AdvisoryVDB Entry
- www.zerodayinitiative.com/advisories/ZDI-16-201nvdThird Party AdvisoryVDB Entry
- support.apple.com/HT206166nvdVendor Advisory
- support.apple.com/HT206167nvdVendor Advisory
- support.apple.com/HT206168nvdVendor Advisory
- support.apple.com/HT206169nvdVendor Advisory
News mentions
0No linked articles in our index yet.