CVE-2015-7629
Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextFormat object with a crafted tabStops property, a different vulnerability than CVE-2015-7631, CVE-2015-7643, and CVE-2015-7644.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Use-after-free in Adobe Flash Player's TextFormat.tabStops allows remote code execution via a crafted SWF file.
Vulnerability
A use-after-free vulnerability exists in Adobe Flash Player's TextFormat object when the tabStops property is manipulated [3]. This flaw affects Flash Player versions before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X, before 11.2.202.535 on Linux, as well as Adobe AIR before 19.0.0.213 and corresponding SDK versions [1][2]. The bug allows a dangling pointer to be reused after it has been freed, leading to memory corruption.
Exploitation
An attacker can exploit this vulnerability by crafting a malicious SWF file that manipulates the tabStops property of a TextFormat object [3]. The attack requires user interaction: the victim must visit a malicious web page or open a malicious file [3]. No authentication or special network position is needed; the attacker simply hosts the SWF and lures the target. The specific sequence involves triggering the use-after-free condition to corrupt memory in a controlled manner.
Impact
Successful exploitation allows an attacker to execute arbitrary code in the context of the current process [2][3]. This can lead to full compromise of the affected system, including potential data disclosure, denial of service, or further escalation [2]. The vulnerability is rated Critical by Adobe and Red Hat, with a CVSS base score of 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) [3].
Mitigation
Adobe released fixed versions: Flash Player 18.0.0.252 and 19.0.0.207 for Windows/OS X, 11.2.202.535 for Linux, and AIR 19.0.0.213 [1][2]. Red Hat provided updated packages to version 11.2.202.548 for RHEL [2]. Gentoo recommends upgrading to >=11.2.202.548 [4]. No workaround is available [4]. Users should apply the latest updates immediately.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
12cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: <19.0.0.213
cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: <19.0.0.213
cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: <19.0.0.213
- Range: <18.0.0.252 and <19.0.0.207
- osv-coords4 versionspkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012
< 11.2.202.535-0.20.1+ 3 more
- (no CPE)range: < 11.2.202.535-0.20.1
- (no CPE)range: < 11.2.202.535-0.20.1
- (no CPE)range: < 11.2.202.535-105.1
- (no CPE)range: < 11.2.202.535-105.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- helpx.adobe.com/security/products/flash-player/apsb15-25.htmlnvdPatchVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1893.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-2024.htmlnvd
- www.securityfocus.com/bid/77061nvd
- www.securitytracker.com/id/1033797nvd
- www.zerodayinitiative.com/advisories/ZDI-15-514nvd
- security.gentoo.org/glsa/201511-02nvd
News mentions
0No linked articles in our index yet.