First published: Wed Oct 14 2015(Updated: )
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextLine object with a crafted validity property, a different vulnerability than CVE-2015-7629, CVE-2015-7643, and CVE-2015-7644.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Flash Player for Internet Explorer 11 | <=19.0.0.185 | |
macOS Yosemite | ||
Microsoft Windows | ||
Adobe AIR | <=19.0.0.190 | |
Google Android | ||
Adobe Flash Player for Internet Explorer 11 | <=11.2.202.521 | |
Linux Kernel | ||
Adobe AIR SDK and Compiler | <=19.0.0.190 | |
Adobe AIR SDK & Compiler | <=19.0.0.190 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7631 is classified as a critical severity vulnerability that allows attackers to execute arbitrary code.
To fix CVE-2015-7631, users should update Adobe Flash Player and Adobe AIR to the latest versions that are not affected by this vulnerability.
CVE-2015-7631 affects Adobe Flash Player and Adobe AIR on Windows, OS X, and Linux systems, specifically versions prior to the specified updates.
Yes, CVE-2015-7631 can be exploited remotely, allowing attackers to execute code without physical access to the system.
Exploitation of CVE-2015-7631 can lead to a wide range of attacks, including data theft, system compromise, and unauthorized access to sensitive information.