First published: Mon Dec 28 2015(Updated: )
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Flash Player for Internet Explorer 11 | <=18.0.0.268 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.185 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.207 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.226 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.245 | |
Adobe Flash Player for Internet Explorer 11 | =20.0.0.228 | |
Adobe Flash Player for Internet Explorer 11 | =20.0.0.235 | |
macOS Yosemite | ||
Microsoft Windows | ||
Adobe AIR SDK and Compiler | <=20.0.0.204 | |
Adobe AIR SDK & Compiler | <=20.0.0.204 | |
Apple iPhone OS | ||
Google Android | ||
Adobe Flash Player for Internet Explorer 11 | <=11.2.202.554 | |
Linux Kernel | ||
Adobe AIR | <=20.0.0.204 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8634 has a critical severity rating due to the potential for remote code execution by an attacker.
To fix CVE-2015-8634, users should update Adobe Flash Player and Adobe AIR to the latest versions that address the vulnerability.
CVE-2015-8634 affects Adobe Flash Player versions before 18.0.0.324, 19.x before 20.0.0.267, and Adobe AIR before 20.0.0.233.
Yes, CVE-2015-8634 can affect users on macOS and Linux if they are using the vulnerable versions of Adobe Flash Player or Adobe AIR.
CVE-2015-8634 can be exploited through malicious Flash content, allowing attackers to execute arbitrary code on the victim's system.