Exploited
CWE
787
Advisory Published
Updated

CVE-2015-3043: Adobe Flash Player Memory Corruption Vulnerability

First published: Tue Apr 14 2015(Updated: )

Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042.

Credit: psirt@adobe.com psirt@adobe.com

Affected SoftwareAffected VersionHow to fix
Adobe Acrobat Reader
All of
Adobe Acrobat Reader<11.2.202.457
Linux Kernel
All of
Any of
Adobe Acrobat Reader<13.0.0.281
Adobe Acrobat Reader>=14.0.0.125<17.0.0.169
Any of
Apple iOS and macOS
Microsoft Windows
SUSE Linux Enterprise Desktop=11.0-sp3
SUSE Linux Enterprise Desktop=12.0
SUSE Linux Enterprise Workstation Extension=12.0
openSUSE Evergreen=11.4
openSUSE=13.1
openSUSE=13.2
redhat enterprise Linux desktop=5.0
redhat enterprise Linux desktop=6.0
redhat enterprise Linux eus=6.6
redhat enterprise Linux server=5.0
redhat enterprise Linux server=6.0
redhat enterprise Linux server aus=6.6
Red Hat Enterprise Linux Server Supplementary EUS=5.0
Red Hat Enterprise Linux Server Supplementary EUS=6.0
redhat enterprise Linux workstation=5.0
redhat enterprise Linux workstation=6.0
Adobe Acrobat Reader<=11.2.202.451
Linux Kernel
Adobe Acrobat Reader<=13.0.0.264
Adobe Acrobat Reader=14.0.0.125
Adobe Acrobat Reader=14.0.0.145
Adobe Acrobat Reader=14.0.0.176
Adobe Acrobat Reader=14.0.0.179
Adobe Acrobat Reader=15.0.0.152
Adobe Acrobat Reader=15.0.0.167
Adobe Acrobat Reader=15.0.0.189
Adobe Acrobat Reader=15.0.0.223
Adobe Acrobat Reader=15.0.0.239
Adobe Acrobat Reader=15.0.0.246
Adobe Acrobat Reader=16.0.0.235
Adobe Acrobat Reader=16.0.0.257
Adobe Acrobat Reader=16.0.0.287
Adobe Acrobat Reader=16.0.0.296
Adobe Acrobat Reader=17.0.0.134
Apple iOS and macOS
Microsoft Windows
redhat enterprise linux desktop supplementary=5.0-client
redhat enterprise linux desktop supplementary=6.0
Red Hat Enterprise Linux Server Supplementary=6.0
Red Hat Enterprise Linux Server Supplementary EUS=6.6.z
Red Hat Enterprise Linux Supplementary=5.0-server
Red Hat Enterprise Linux Workstation Supplementary=6.0
All of
<11.2.202.457
All of
Any of
<13.0.0.281
>=14.0.0.125<17.0.0.169
Any of
=11.0-sp3
=12.0
=12.0
=11.4
=13.1
=13.2
=5.0
=6.0
=6.6
=5.0
=6.0
=6.6
=5.0
=6.0
=5.0
=6.0

Remedy

The impacted product is end-of-life and should be disconnected if still in use.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2015-3043?

    CVE-2015-3043 has a high severity rating as it allows attackers to execute arbitrary code or cause denial of service due to memory corruption.

  • How do I fix CVE-2015-3043?

    To fix CVE-2015-3043, update Adobe Flash Player to version 17.0.0.169 or later.

  • Which versions of Adobe Flash Player are affected by CVE-2015-3043?

    CVE-2015-3043 affects Adobe Flash Player versions prior to 13.0.0.281, 14.x through 17.x before 17.0.0.169, and 11.2.202.457 on Linux.

  • Can CVE-2015-3043 affect Linux systems running Adobe Flash Player?

    Yes, CVE-2015-3043 affects Linux systems running Adobe Flash Player versions earlier than 11.2.202.457.

  • Is there a workaround for CVE-2015-3043 if I can't update Adobe Flash Player?

    While the best approach is to update to the latest version, temporary mitigation includes disabling Flash Player in your browser or application until updated.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203