CVE-2015-7631
Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextLine object with a crafted validity property, a different vulnerability than CVE-2015-7629, CVE-2015-7643, and CVE-2015-7644.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Adobe Flash Player use-after-free via TextLine validity property allows remote code execution.
Vulnerability
A use-after-free vulnerability exists in Adobe Flash Player versions before 18.0.0.252, 19.x before 19.0.0.207, and 11.2.202.535 on Linux. The flaw resides in the handling of the TextLine object, specifically its validity property. By manipulating this property, an attacker can trigger a dangling pointer to be reused after the object has been freed, leading to memory corruption. The vulnerability affects Adobe Flash Player on Windows, OS X, and Linux, as well as Adobe AIR, AIR SDK, and AIR SDK & Compiler before version 19.0.0.213 [1][2][3].
Exploitation
Exploitation requires user interaction: the target must visit a malicious web page or open a specially crafted SWF file. The attacker can leverage a crafted TextLine object with a manipulated validity property to force the use of an already-freed memory region. This can be achieved without any special authentication or network position beyond the ability to deliver the malicious SWF content (e.g., via a website or email link) [3].
Impact
Successful exploitation allows an attacker to execute arbitrary code within the context of the current process (the Flash Player plugin). This could lead to full compromise of the affected system, including the ability to install programs, view, change, or delete data, or create new accounts with full user rights. The CVSS base score is 6.8 (medium severity) [3].
Mitigation
Adobe released updates fixing this vulnerability as part of APSB15-25, APSB15-27, and APSB15-28. The fixed versions are: Flash Player 18.0.0.252/19.0.0.207 (Windows/Mac), 11.2.202.535 (Linux), and AIR 19.0.0.213. Red Hat and Gentoo have also provided updated packages [1][2][4]. Users should upgrade to the latest versions immediately. No workaround other than disabling Flash or applying the patch is available [4].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
12cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: < 19.0.0.213
cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: < 19.0.0.213
cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: < 19.0.0.213
- Range: < 19.0.0.207 (Windows/OS X), < 11.2.202.535 (Linux)
- osv-coords4 versionspkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012
< 11.2.202.535-0.20.1+ 3 more
- (no CPE)range: < 11.2.202.535-0.20.1
- (no CPE)range: < 11.2.202.535-0.20.1
- (no CPE)range: < 11.2.202.535-105.1
- (no CPE)range: < 11.2.202.535-105.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- helpx.adobe.com/security/products/flash-player/apsb15-25.htmlnvdPatchVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1893.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-2024.htmlnvd
- www.securityfocus.com/bid/77061nvd
- www.securitytracker.com/id/1033797nvd
- www.zerodayinitiative.com/advisories/ZDI-15-513nvd
- security.gentoo.org/glsa/201511-02nvd
News mentions
0No linked articles in our index yet.