CVE-2015-7634
Description
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7633.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Adobe Flash Player before 18.0.0.252, 19.x before 19.0.0.207, and 11.2.202.535 on Linux, along with AIR SDK and Compiler, contain a memory corruption vulnerability that allows remote code execution or denial of service via unspecified vectors.
Vulnerability
Adobe Flash Player versions prior to 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X, and before 11.2.202.535 on Linux, as well as Adobe AIR before 19.0.0.213 and Adobe AIR SDK & Compiler before 19.0.0.213, are affected by a memory corruption vulnerability [1][2][3]. The bug is triggered via unspecified vectors, likely involving a specially crafted SWF file [2].
Exploitation
An attacker can exploit this vulnerability by delivering a malicious SWF file to a victim and persuading the victim to view a web page containing that file [2]. No additional authentication or special network position beyond the ability to serve or inject the SWF content is required; the attack succeeds if the victim uses an affected Flash Player or AIR runtime [1][2][3].
Impact
Successful exploitation allows an attacker to execute arbitrary code on the affected system with the privileges of the user running Flash Player, or to cause a denial of service (memory corruption) [1][2][3]. In the context of a web browser plugin, this can lead to full system compromise if the user has administrative rights [2].
Mitigation
Adobe released fixed versions: Flash Player 18.0.0.252 and 19.0.0.207 for Windows and OS X, Flash Player 11.2.202.535 for Linux, and AIR 19.0.0.213 [1][2][3]. Red Hat provided updated packages (flash-plugin to 11.2.202.548) as part of RHSA-2015-1893 and RHSA-2015-2024 [1][2]. Gentoo also advised upgrading to >=www-plugins/adobe-flash-11.2.202.548 [3]. Users should apply the latest version from Adobe or their OS vendor.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
12cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: <19.0.0.213
cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: <19.0.0.213
cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: <19.0.0.213
- Range: <19.0.0.207 (Windows/OS X) or <11.2.202.535 (Linux)
- osv-coords4 versionspkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012
< 11.2.202.535-0.20.1+ 3 more
- (no CPE)range: < 11.2.202.535-0.20.1
- (no CPE)range: < 11.2.202.535-0.20.1
- (no CPE)range: < 11.2.202.535-105.1
- (no CPE)range: < 11.2.202.535-105.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- helpx.adobe.com/security/products/flash-player/apsb15-25.htmlnvdPatchVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1893.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-2024.htmlnvd
- www.securityfocus.com/bid/77065nvd
- www.securitytracker.com/id/1033797nvd
- security.gentoo.org/glsa/201511-02nvd
News mentions
0No linked articles in our index yet.