VYPR
High severity7.8NVD Advisory· Published Mar 24, 2016· Updated May 6, 2026

CVE-2016-1740

CVE-2016-1740

Description

FontParser in Apple iOS before 9.3, OS X before 10.11.4, tvOS before 9.2, and watchOS before 2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory corruption vulnerability in Apple's FontParser allows arbitrary code execution via a crafted PDF, affecting multiple Apple platforms.

Vulnerability

FontParser in Apple iOS before 9.3, OS X before 10.11.4, tvOS before 9.2, and watchOS before 2.2 contains a memory corruption issue when parsing fonts embedded in PDF documents. This allows a remote attacker to trigger arbitrary code execution or denial of service via a specially crafted PDF file. [1][2][3][4]

Exploitation

An attacker can deliver a malicious PDF document to the target user, for example via email, web download, or other means. No authentication is required; the user only needs to open the PDF in an application that uses FontParser (e.g., Preview, Safari, or any PDF viewer on the affected system). The parsing of the crafted font data triggers memory corruption, leading to code execution.

Impact

Successful exploitation allows arbitrary code execution in the context of the application processing the PDF. This could lead to full system compromise on OS X, or app sandbox escape on iOS/tvOS/watchOS. Alternatively, the attacker could cause a denial of service via application termination.

Mitigation

Apple addressed this vulnerability in iOS 9.3, OS X El Capitan v10.11.4, tvOS 9.2, and watchOS 2.2, released on March 21, 2016. Users should update their devices to these versions or later. No workarounds are documented; the only mitigation is to apply the security updates. [1][2][3][4]

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

8
  • cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
    Range: <9.3
  • cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
    Range: <10.11.4
  • Apple Inc./tvOS2 versions
    cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*range: <9.2
    • (no CPE)range: <9.2
  • cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*range: <2.2
    • (no CPE)range: <2.2
  • Apple Inc./iOSllm-fuzzy
    Range: <9.3
  • Apple Inc./OS Xllm-fuzzy
    Range: <10.11.4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.