First published: Sun Oct 18 2015(Updated: )
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7629, CVE-2015-7631, CVE-2015-7635, CVE-2015-7636, CVE-2015-7637, CVE-2015-7638, CVE-2015-7639, CVE-2015-7640, CVE-2015-7641, CVE-2015-7643, and CVE-2015-7644.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe AIR | <=19.0.0.190 | |
Adobe AIR SDK and Compiler | <=19.0.0.190 | |
Adobe AIR SDK & Compiler | <=19.0.0.190 | |
macOS Yosemite | ||
Microsoft Windows | ||
Adobe Flash Player for Internet Explorer 11 | <=19.0.0.185 | |
Google Android | ||
Adobe Flash Player for Internet Explorer 11 | <=11.2.202.521 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7642 is classified as a critical vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2015-7642, upgrade Adobe Flash Player and Adobe AIR to the latest versions that include the security patch.
CVE-2015-7642 affects Adobe Flash Player versions prior to 18.0.0.252 and 19.x prior to 19.0.0.207, as well as several versions of Adobe AIR.
CVE-2015-7642 affects systems running Adobe Flash Player and Adobe AIR prior to the patched versions on Windows, macOS, and Linux.
Yes, CVE-2015-7642 can be exploited remotely by an attacker who sends a crafted Flash content that triggers the vulnerability.