CVE-2015-7644
Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7629, CVE-2015-7631, and CVE-2015-7643.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Adobe Flash Player before 18.0.0.252/19.0.0.207 (Windows/OS X) or 11.2.202.535 (Linux) contains a use-after-free that lets attackers execute arbitrary code via crafted SWF files.
Vulnerability
A use-after-free vulnerability exists in Adobe Flash Player prior to version 18.0.0.252 and 19.x before 19.0.0.207 on Windows and macOS, and before version 11.2.202.535 on Linux. The issue also affects Adobe AIR before 19.0.0.213 and related SDK versions. The flaw is reachable when a victim loads a specially crafted SWF file; no special configuration beyond enabling Flash content is required [1][3].
Exploitation
To exploit this vulnerability, an attacker must lure a victim into opening a malicious SWF file, typically by visiting a compromised website or opening a crafted email attachment. No authentication or special network position is needed beyond the user viewing the content in a browser or other Flash-enabled application. The exploit sequence involves triggering the use-after-free condition via unspecified vectors, leading to memory corruption [1][3].
Impact
Successful exploitation allows the attacker to execute arbitrary code within the context of the Flash Player process. Depending on the user's privileges, this can lead to full system compromise, including installation of malware, data exfiltration, or denial of service. The vulnerability is rated as critical (CVSS base score not provided but described as Critical by Red Hat) [1][2].
Mitigation
Adobe released fixed versions: Flash Player 18.0.0.252/19.0.0.207 (Windows/macOS) and 11.2.202.535 (Linux), as well as AIR 19.0.0.213. Red Hat provided updates to version 11.2.202.548 for RHEL 5 Supplementary (RHSA-2015:2024) and earlier RHSA-2015:1893 addressed related issues [1][2]. Gentoo users should upgrade to >=www-plugins/adobe-flash-11.2.202.548 [3]. No workarounds are available; users must install the updates to mitigate the risk.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
11cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: <19.0.0.213
cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*range: <=19.0.0.190
- (no CPE)range: <19.0.0.213
- cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*Range: <=19.0.0.190
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*range: <=19.0.0.185
- (no CPE)range: <18.0.0.252; >=19.0.0 <19.0.0.207 on Windows/OS X; <11.2.202.535 on Linux
- osv-coords4 versionspkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012
< 11.2.202.535-0.20.1+ 3 more
- (no CPE)range: < 11.2.202.535-0.20.1
- (no CPE)range: < 11.2.202.535-0.20.1
- (no CPE)range: < 11.2.202.535-105.1
- (no CPE)range: < 11.2.202.535-105.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- helpx.adobe.com/security/products/flash-player/apsb15-25.htmlnvdPatchVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1893.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-2024.htmlnvd
- www.securityfocus.com/bid/77061nvd
- www.securitytracker.com/id/1033797nvd
- security.gentoo.org/glsa/201511-02nvd
News mentions
0No linked articles in our index yet.