Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
04 Feb 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784 - Broken Link, Third Party Advisory |
23 Jan 2025, 17:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2015-1235.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201508-01 - Third Party Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsb15-18.html - Broken Link, Vendor Advisory | |
References | () https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784 - Broken Link, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html - Mailing List, Third Party Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsa15-04.html - Broken Link, Vendor Advisory | |
References | () http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/ - Broken Link, Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/918568 - Third Party Advisory, US Government Resource | |
References | () http://www.securitytracker.com/id/1032890 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/ncas/alerts/TA15-195A - Third Party Advisory, US Government Resource | |
References | () http://marc.info/?l=bugtraq&m=144050155601375&w=2 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/75710 - Broken Link, Third Party Advisory, VDB Entry |
02 Jul 2024, 17:42
Type | Values Removed | Values Added |
---|---|---|
References | (BID) http://www.securityfocus.com/bid/75710 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CONFIRM) https://helpx.adobe.com/security/products/flash-player/apsa15-04.html - Broken Link, Vendor Advisory | |
References | (MISC) http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/ - Broken Link, Third Party Advisory | |
References | (HP) https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784 - Broken Link, Third Party Advisory | |
References | (CONFIRM) https://helpx.adobe.com/security/products/flash-player/apsb15-18.html - Broken Link, Vendor Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1032890 - Broken Link, Third Party Advisory, VDB Entry | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
Information
Published : 2015-07-14 10:59
Updated : 2025-02-14 16:06
NVD link : CVE-2015-5123
Mitre link : CVE-2015-5123
JSON object : View
Products Affected
redhat
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_server
- enterprise_linux_workstation
adobe
- flash_player_desktop_runtime
- flash_player
suse
- linux_enterprise_workstation_extension
- linux_enterprise_desktop
apple
- macos
opensuse
- evergreen
microsoft
- windows
linux
- linux_kernel
CWE
CWE-416
Use After Free