First published: Mon Dec 28 2015(Updated: )
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Flash Player for Internet Explorer 11 | <=18.0.0.268 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.185 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.207 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.226 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.245 | |
Adobe Flash Player for Internet Explorer 11 | =20.0.0.228 | |
Adobe Flash Player for Internet Explorer 11 | =20.0.0.235 | |
macOS Yosemite | ||
Microsoft Windows | ||
Adobe Flash Player for Internet Explorer 11 | <=11.2.202.554 | |
Linux Kernel | ||
Adobe AIR | <=20.0.0.204 | |
Google Android | ||
Adobe AIR SDK and Compiler | <=20.0.0.204 | |
Adobe AIR SDK & Compiler | <=20.0.0.204 | |
Apple iPhone OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8643 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2015-8643, users should update Adobe Flash Player to version 18.0.0.324 or later, as well as ensure Adobe AIR and its SDK are updated to version 20.0.0.233 or newer.
Adobe Flash Player versions before 18.0.0.324, as well as specific versions in the 19.x and 20.x series, are affected by CVE-2015-8643.
CVE-2015-8643 does not affect macOS Yosemite or various versions of Windows and Linux Kernel.
CVE-2015-8643 allows attackers to execute arbitrary code on the victim's machine under certain conditions, leading to potential system compromise.