CVE-2015-5127
Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Use-after-free in Adobe Flash Player's DisplacementMapFilter.mapBitmap handling enables arbitrary code execution.
Vulnerability
A use-after-free vulnerability exists in Adobe Flash Player due to improper handling of BitmapData objects when setting the DisplacementMapFilter.mapBitmap property [2]. This allows an attacker to free a memory object and then reference it, leading to code execution. Affected versions include Flash Player before 18.0.0.232 on Windows and OS X, before 11.2.202.508 on Linux, and Adobe AIR before 18.0.0.199 [1][3].
Exploitation
An attacker can exploit this by crafting a malicious SWF file that manipulates BitmapData and DisplacementMapFilter objects. The provided reproduction case [2] involves compiling an ActionScript 2 (AS2) file, manually modifying bytes to trigger the issue, then serving the SWF via a web browser. User interaction is required (e.g., opening a web page containing the SWF). The use-after-free is triggered when the Flash player dereferences a controlled memory address [2].
Impact
Successful exploitation allows an attacker to execute arbitrary code with the privileges of the user running the Flash Player. This can lead to full system compromise, including data theft, installation of malware, or further network attacks. The vulnerability is classified as critical with a high CVSS score.
Mitigation
Adobe released fixed versions in August 2015: Flash Player 18.0.0.232 (Windows/OS X), 11.2.202.508 (Linux), and AIR 18.0.0.199 [1][3]. Users should update immediately. There is no known workaround. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog at the time of writing.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
11- cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*Range: <=18.0.0.180
- Range: before 18.0.0.199
- Range: before 18.0.0.232 (Windows/OS X), before 11.2.202.508 (Linux)
- osv-coords4 versionspkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012
< 11.2.202.508-0.14.1+ 3 more
- (no CPE)range: < 11.2.202.508-0.14.1
- (no CPE)range: < 11.2.202.508-0.14.1
- (no CPE)range: < 11.2.202.508-99.1
- (no CPE)range: < 11.2.202.508-99.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- helpx.adobe.com/security/products/flash-player/apsb15-19.htmlnvdPatchVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/76288nvdThird Party AdvisoryVDB Entry
- rhn.redhat.com/errata/RHSA-2015-1603.htmlnvd
- www.securitytracker.com/id/1033235nvd
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvd
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvd
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvd
- security.gentoo.org/glsa/201508-01nvd
- www.exploit-db.com/exploits/37861/nvd
News mentions
0No linked articles in our index yet.