VYPR
Unrated severityNVD Advisory· Published Apr 14, 2015· Updated May 6, 2026

CVE-2015-0355

CVE-2015-0355

Description

Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Adobe Flash Player before 13.0.0.281 and 17.x before 17.0.0.169 on Windows/OS X and before 11.2.202.457 on Linux allows memory corruption leading to arbitrary code execution or denial of service.

Vulnerability

A memory corruption vulnerability exists in Adobe Flash Player versions before 13.0.0.281, 14.x through 17.x before 17.0.0.169 on Windows and OS X, and before 11.2.202.457 on Linux [1][2]. The flaw, triggered via unspecified vectors, allows an attacker to corrupt memory and potentially execute arbitrary code [1]. Affected versions include Flash Player 13.x and earlier, as well as 14.x-17.x prior to 17.0.0.169 on desktop platforms, and 11.x before 11.2.202.457 on Linux [1][2].

Exploitation

An attacker can exploit this vulnerability by convincing a user to open a specially crafted Flash file (e.g., via a web page or email) [1]. The attack requires no authentication and can be delivered remotely [1]. The exact vectors are not detailed, but the vulnerability is reachable when the user views malicious SWF content in a browser or other Flash-enabled application [1][2]. No user interaction beyond normal browsing is needed.

Impact

Successful exploitation allows arbitrary code execution in the context of the affected user or process, or a denial of service (memory corruption) [1][2]. The attacker could potentially install programs; view, change, or delete data; or create new accounts with full user rights [2]. On Linux systems, the impact is similarly severe due to the vulnerable player [2].

Mitigation

Adobe released fixed versions: Flash Player 13.0.0.281 and 17.0.0.169 for Windows/OS X, and version 11.2.202.457 for Linux [1][2]. Users should update immediately. Red Hat provided updates for Adobe Flash as part of RHSA-2015:0813 [1]. Gentoo users upgraded via glsa-201504-07 [2]. No workarounds are available [2]; the only mitigation is applying the vendor patch.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

30
  • cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*+ 16 more
    • cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*range: <=11.2.202.451
    • cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*
    • cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*
    • (no CPE)range: <=17.0.0.169 (Windows/OS X) and <=11.2.202.457 (Linux)
  • OpenSUSE/openSUSE2 versions
    cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:suse:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
    • cpe:2.3:o:suse:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux_workstation_extension:12.0:*:*:*:*:*:*:*
  • osv-coords2 versions
    < 11.2.202.457-80.1+ 1 more
    • (no CPE)range: < 11.2.202.457-80.1
    • (no CPE)range: < 11.2.202.457-80.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.