First published: Mon Dec 28 2015(Updated: )
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8649, and CVE-2015-8650.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe AIR | <=20.0.0.204 | |
macOS Yosemite | ||
Google Android | ||
Microsoft Windows | ||
Adobe Flash Player for Internet Explorer 11 | <=18.0.0.268 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.185 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.207 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.226 | |
Adobe Flash Player for Internet Explorer 11 | =19.0.0.245 | |
Adobe Flash Player for Internet Explorer 11 | =20.0.0.228 | |
Adobe Flash Player for Internet Explorer 11 | =20.0.0.235 | |
Adobe AIR SDK and Compiler | <=20.0.0.204 | |
Adobe AIR SDK & Compiler | <=20.0.0.204 | |
Apple iPhone OS | ||
Adobe Flash Player for Internet Explorer 11 | <=11.2.202.554 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8648 is categorized as a critical vulnerability allowing attackers to execute arbitrary code remotely.
To fix CVE-2015-8648, upgrade Adobe Flash Player to version 18.0.0.324 or later, and Adobe AIR to version 20.0.0.233 or later.
CVE-2015-8648 affects Adobe Flash Player versions before 18.0.0.324 and 19.x, Adobe AIR versions before 20.0.0.233, and specific versions of Flash Player on Internet Explorer.
CVE-2015-8648 impacts Adobe Flash Player and Adobe AIR on Windows, macOS, and Linux.
CVE-2015-8648 is a use-after-free vulnerability, which can lead to memory corruption and potential code execution.