VYPR
Unrated severityNVD Advisory· Published Aug 14, 2015· Updated May 6, 2026

CVE-2015-5540

CVE-2015-5540

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Adobe Flash Player before 18.0.0.232/11.2.202.508 and AIR before 18.0.0.199 allows arbitrary code execution via crafted SWF.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player and Adobe AIR, affecting Windows and OS X versions before 18.0.0.232, Linux versions before 11.2.202.508, and AIR versions before 18.0.0.199 [1][3]. The bug is triggered when a watch is set on the childNodes object of an XML node and the XML tree is manipulated (e.g., appending a child), causing the watch function to delete child nodes while the original enumeration still accesses the freed buffer [2]. This is one of several similar vulnerabilities (CVE-2015-5127, etc.) [description].

Exploitation

An attacker can exploit this by delivering a specially crafted SWF file to the victim. No authentication is required; only user interaction (opening the file or visiting a malicious site) is needed [1]. The exploit sequence involves setting a watch on the length property of the childNodes array, then appending a child node. The watch handler removes all child nodes, causing the underlying buffer to be freed while the original function still references it [2]. This enables control of the freed memory to achieve code execution.

Impact

Successful exploitation allows arbitrary code execution in the context of the user running the Flash process [1][3]. An attacker could gain full control over the affected system, potentially leading to data disclosure, denial of service, or further compromise [3].

Mitigation

Adobe released fixed versions: Flash Player 18.0.0.232 (Windows/OS X) and 11.2.202.508 (Linux), and AIR 18.0.0.199 [1][3]. Users should upgrade immediately as there is no known workaround [3]. Red Hat and Gentoo have issued advisories urging updates [1][3].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

12

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.