CVE-2015-7633
Description
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7634.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Attackers can execute arbitrary code or cause denial of service via memory corruption in Adobe Flash Player before 18.0.0.252/19.0.0.207 or 11.2.202.535.
Vulnerability
CVE-2015-7633 is a memory corruption vulnerability in Adobe Flash Player that can lead to arbitrary code execution or a denial of service. The affected versions are Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X, and before 11.2.202.535 on Linux, as well as Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 [1]. The flaw is triggered via unspecified vectors, requiring that a user loads a specially crafted SWF file [2].
Exploitation
An attacker can exploit this vulnerability by convincing a victim to open a malicious SWF file, typically by hosting it on a website or embedding it in an email or other document. No special authentication or network position beyond delivering the SWF is required – the victim’s browser or application that handles Flash content will automatically parse the malicious file, leading to memory corruption [2].
Impact
Successful exploitation results in arbitrary code execution in the context of the affected user or process, or a denial of service (crash) [2]. The attacker gains full control of the victim’s system at the privilege level of the Flash process, enabling actions such as data theft, malware installation, or system disruption.
Mitigation
Adobe released updated versions to fix this vulnerability: Flash Player 18.0.0.252, 19.0.0.207, and 11.2.202.548 (Linux), along with corresponding AIR updates (19.0.0.213) [1]. Red Hat provided an updated flash-plugin package (version 11.2.202.548) for Red Hat Enterprise Linux 5 and 6 Supplementary [2]. Gentoo also updated www-plugins/adobe-flash to version 11.2.202.548 [3]. Users and administrators should apply the latest updates immediately; no effective workaround is known beyond disabling or removing Flash Player [3].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
12cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: <19.0.0.213
cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: <19.0.0.213
cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: <19.0.0.213
- Range: <18.0.0.252 / <19.0.0.207 (Windows/OS X) and <11.2.202.535 (Linux)
- osv-coords4 versionspkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012
< 11.2.202.535-0.20.1+ 3 more
- (no CPE)range: < 11.2.202.535-0.20.1
- (no CPE)range: < 11.2.202.535-0.20.1
- (no CPE)range: < 11.2.202.535-105.1
- (no CPE)range: < 11.2.202.535-105.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- helpx.adobe.com/security/products/flash-player/apsb15-25.htmlnvdPatchVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1893.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-2024.htmlnvd
- www.securityfocus.com/bid/77065nvd
- www.securitytracker.com/id/1033797nvd
- security.gentoo.org/glsa/201511-02nvd
News mentions
0No linked articles in our index yet.