CVE Vulnerabilities

CVE-2015-5119

Use After Free

Published: Jul 08, 2015 | Modified: Nov 17, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
10 HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
6.8 CRITICAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

NameVendorStart VersionEnd Version
Flash_playerAdobe13.0.0.182 (including)13.0.0296 (including)
Flash_playerAdobe14.0.0.125 (including)18.0.0.194 (including)
Red Hat Enterprise Linux 5 SupplementaryRedHatflash-plugin-0:11.2.202.481-1.el5*
Supplementary for Red Hat Enterprise Linux 6RedHatflash-plugin-0:11.2.202.481-1.el6_6*
Adobe-flashpluginUbuntudevel*
Adobe-flashpluginUbuntuprecise*
Adobe-flashpluginUbuntutrusty*
Adobe-flashpluginUbuntuupstream*
Adobe-flashpluginUbuntuutopic*
Adobe-flashpluginUbuntuvivid*
Flashplugin-nonfreeUbuntudevel*
Flashplugin-nonfreeUbuntuprecise*
Flashplugin-nonfreeUbuntutrusty*
Flashplugin-nonfreeUbuntuupstream*
Flashplugin-nonfreeUbuntuutopic*
Flashplugin-nonfreeUbuntuvivid*

Potential Mitigations

References