VYPR
Unrated severityNVD Advisory· Published Aug 14, 2015· Updated May 6, 2026

CVE-2015-5551

CVE-2015-5551

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Adobe Flash Player before 18.0.0.232/11.2.202.508 allows remote code execution via unspecified vectors.

Vulnerability

CVE-2015-5551 is a use-after-free vulnerability in Adobe Flash Player affecting versions before 18.0.0.232 on Windows and OS X, and before 11.2.202.508 on Linux. It also affects Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199. The vulnerability is triggered via unspecified vectors, as noted in the official description [1][2]. This issue is part of a larger set of Flash Player vulnerabilities disclosed in August 2015.

Exploitation

An attacker can exploit this vulnerability by convincing a user to open a specially crafted SWF file, typically by visiting a malicious web page or opening a malicious email attachment. No authentication is required, and the attacker does not need any special network position beyond being able to deliver the crafted content. The user interaction required is minimal (e.g., clicking a link or opening a file). The exact exploitation steps are not publicly detailed, but the use-after-free condition can be triggered through crafted ActionScript or other Flash content [1][2].

Impact

Successful exploitation allows an attacker to execute arbitrary code with the privileges of the user running the Flash Player. This can lead to full compromise of the affected system, including data theft, installation of malware, or further lateral movement within a network. The impact is rated as critical, with a CVSS score of 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) [1].

Mitigation

Adobe released fixed versions on August 11, 2015: Flash Player 18.0.0.232 (Windows/OS X) and 11.2.202.508 (Linux), and AIR 18.0.0.199. Users should update immediately via the Adobe update mechanism or by downloading the latest version from Adobe's website. Red Hat issued RHSA-2015:1603 for affected Red Hat Enterprise Linux versions [1], and Gentoo published GLSA 201508-01 [2]. No workarounds are available; the only mitigation is to apply the patch or disable Flash Player if updating is not possible.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

11

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.