TrueTypeScaler in Apple iOS before 9.3, OS X before 10.11.4, tvOS before 9.2, and watchOS before 2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
TrueTypeScaler in Apple iOS before 9.3, OS X before 10.11.4, tvOS before 9.2, and watchOS before 2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://support.apple.com/HT205635 | x_refsource_CONFIRM |
| https://support.apple.com/HT205637 | x_refsource_CONFIRM |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html | vendor-advisory x_refsource_APPLE |
| http://www.securitytracker.com/id/1035353 | vdb-entry x_refsource_SECTRACK |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html | vendor-advisory x_refsource_APPLE |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html | vendor-advisory x_refsource_APPLE |
| https://support.apple.com/HT205641 | x_refsource_CONFIRM |
| https://support.apple.com/HT205640 | x_refsource_CONFIRM |
| http://www.zerodayinitiative.com/advisories/ZDI-16-204 | x_refsource_MISC |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html | vendor-advisory x_refsource_APPLE |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://support.apple.com/HT205635 | x_refsource_CONFIRM x_transferred |
| https://support.apple.com/HT205637 | x_refsource_CONFIRM x_transferred |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html | vendor-advisory x_refsource_APPLE x_transferred |
| http://www.securitytracker.com/id/1035353 | vdb-entry x_refsource_SECTRACK x_transferred |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html | vendor-advisory x_refsource_APPLE x_transferred |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html | vendor-advisory x_refsource_APPLE x_transferred |
| https://support.apple.com/HT205641 | x_refsource_CONFIRM x_transferred |
| https://support.apple.com/HT205640 | x_refsource_CONFIRM x_transferred |
| http://www.zerodayinitiative.com/advisories/ZDI-16-204 | x_refsource_MISC x_transferred |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html | vendor-advisory x_refsource_APPLE x_transferred |
TrueTypeScaler in Apple iOS before 9.3, OS X before 10.11.4, tvOS before 9.2, and watchOS before 2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 3.0 | 7.8 | HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| Primary | 2.0 | 9.3 | HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
| Hyperlink | Source | Resource |
|---|---|---|
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html | product-security@apple.com | Mailing List Vendor Advisory |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html | product-security@apple.com | Mailing List Vendor Advisory |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html | product-security@apple.com | Mailing List Vendor Advisory |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html | product-security@apple.com | Mailing List Vendor Advisory |
| http://www.securitytracker.com/id/1035353 | product-security@apple.com | Third Party Advisory VDB Entry |
| http://www.zerodayinitiative.com/advisories/ZDI-16-204 | product-security@apple.com | Third Party Advisory VDB Entry |
| https://support.apple.com/HT205635 | product-security@apple.com | Vendor Advisory |
| https://support.apple.com/HT205637 | product-security@apple.com | Vendor Advisory |
| https://support.apple.com/HT205640 | product-security@apple.com | Vendor Advisory |
| https://support.apple.com/HT205641 | product-security@apple.com | Vendor Advisory |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
| http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
| http://www.securitytracker.com/id/1035353 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
| http://www.zerodayinitiative.com/advisories/ZDI-16-204 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
| https://support.apple.com/HT205635 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
| https://support.apple.com/HT205637 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
| https://support.apple.com/HT205640 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
| https://support.apple.com/HT205641 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |