VYPR
Unrated severityNVD Advisory· Published Aug 14, 2015· Updated May 6, 2026

CVE-2015-5539

CVE-2015-5539

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Adobe Flash Player use-after-free in AS2 native class SharedObject allows arbitrary code execution before 18.0.0.232/11.2.202.508.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player when a native ActionScript 2 (AS2) class sets an internal atom to a value that is a SharedObject variable. This affects Flash Player before 18.0.0.232 on Windows and OS X, before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, and Adobe AIR SDK/before 18.0.0.199 [1][2][3]. The issue occurs in code paths involving NetConnection.uri and similar properties when combined with SharedObject manipulation.

Exploitation

An attacker can exploit this by serving a crafted SWF file that triggers the use-after-free condition. The proof-of-concept requires loading two SWF files from a web server (due to network sandbox limitations) and works reliably on 64-bit systems, though it can be adapted for 32-bit with proper heap setup [2]. The exploit uses SharedObject.getLocal, ASSetPropFlags, and ASnative calls to corrupt memory, then triggers a crash or code execution through a BitmapData allocation and a timed callback [2].

Impact

Successful exploitation allows an attacker to execute arbitrary code in the context of the affected Flash Player process. This can lead to full system compromise, including installation of programs, viewing/changing/deleting data, or creating new accounts with full user rights [3].

Mitigation

Adobe released fixes in Flash Player 18.0.0.232 (Windows/OS X) and 11.2.202.508 (Linux), AIR 18.0.0.199, and corresponding AIR SDK versions on August 12, 2015 [1][2]. Red Hat issued an update for Adobe Flash Player on Red Hat Enterprise Linux [1]. Gentoo users should upgrade to >=www-plugins/adobe-flash-11.2.202.508 [3]. No workaround is available [3]; upgrading to the patched version is the only mitigation.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

11

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.