Exploited
CWE
416
Advisory Published
Updated

CVE-2015-5122: Adobe Flash Player Use-After-Free Vulnerability

First published: Tue Jul 14 2015(Updated: )

Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.

Credit: psirt@adobe.com psirt@adobe.com

Affected SoftwareAffected VersionHow to fix
Adobe Flash Player>=13.0<=13.0.0.302
Adobe Flash Player>=18.0<=18.0.0.203
Adobe Flash Player Desktop Runtime>=18.0<=18.0.0.203
Apple macOS
Microsoft Windows
Adobe Flash Player>=18.0<=18.0.0.204
Linux Linux kernel
Adobe Flash Player>=18.0<=18.0.0.203
Adobe Flash Player>=18.0<=18.0.0.203
Microsoft Windows 8
Microsoft Windows 8.1
Adobe Flash Player>=11.0<=11.2.202.481
Redhat Enterprise Linux Desktop=5.0
Redhat Enterprise Linux Desktop=6.0
Redhat Enterprise Linux Server=5.0
Redhat Enterprise Linux Server=6.0
Redhat Enterprise Linux Server Eus=6.6
Redhat Enterprise Linux Workstation=5.0
Redhat Enterprise Linux Workstation=6.0
Opensuse Evergreen=11.4
SUSE Linux Enterprise Desktop=11-sp3
SUSE Linux Enterprise Desktop=11-sp4
SUSE Linux Enterprise Desktop=12
Suse Linux Enterprise Workstation Extension=12
All of
Any of
Adobe Flash Player>=13.0<=13.0.0.302
Adobe Flash Player>=18.0<=18.0.0.203
Adobe Flash Player Desktop Runtime>=18.0<=18.0.0.203
Any of
Apple macOS
Microsoft Windows
All of
Adobe Flash Player>=18.0<=18.0.0.204
Linux Linux kernel
All of
Any of
Adobe Flash Player>=18.0<=18.0.0.203
Adobe Flash Player>=18.0<=18.0.0.203
Any of
Microsoft Windows 8
Microsoft Windows 8.1
All of
Adobe Flash Player>=11.0<=11.2.202.481
Linux Linux kernel
Adobe Flash Player
All of
Any of
>=13.0<=13.0.0.302
>=18.0<=18.0.0.203
>=18.0<=18.0.0.203
Any of
All of
>=18.0<=18.0.0.204
All of
Any of
>=18.0<=18.0.0.203
>=18.0<=18.0.0.203
Any of
All of
>=11.0<=11.2.202.481
=5.0
=6.0
=5.0
=6.0
=6.6
=5.0
=6.0
=11.4
=11-sp3
=11-sp4
=12
=12

Remedy

The impacted product is end-of-life and should be disconnected if still in use.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203