VYPR
Unrated severityNVD Advisory· Published Nov 11, 2015· Updated May 6, 2026

CVE-2015-7651

CVE-2015-7651

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted DefineFunction atoms, a different vulnerability than CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Flash Player's AS2 DefineFunction handling allows remote code execution with user interaction.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player's handling of ActionScript 2 (AS2) DefineFunction atoms. The flaw affects Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and macOS, before 11.2.202.548 on Linux, as well as Adobe AIR before 19.0.0.241. By crafting a malicious SWF file with custom AS2 DefineFunction atoms, an attacker can trigger an invalid free condition, leading to memory corruption [1][3].

Exploitation

An attacker must persuade the target to visit a malicious web page or open a crafted SWF file (user interaction is required). No additional authentication or network position is needed beyond standard web access. The crafted SWF file forces an invalid free when Flash processes the specially formed DefineFunction atoms, which subsequently leads to a use-after-free [3].

Impact

Successful exploitation allows the attacker to execute arbitrary code within the context of the Flash Player process. On Red Hat Enterprise Linux, the advisory states the vulnerability could allow an attacker to cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loads a page containing the malicious SWF content [2]. The attacker gains the same privileges as the user running the browser or Flash application.

Mitigation

Adobe released fixes in Flash Player 18.0.0.261, 19.0.0.245 (Windows/macOS), 11.2.202.548 (Linux), and Adobe AIR 19.0.0.241. Red Hat issued RHSA-2015:2023 and RHSA-2015:2024 to update flash-plugin to version 11.2.202.548 on Red Hat Enterprise Linux 5 and 6 Supplementary [1][2]. Gentoo provided GLSA 201511-02 [4]. No workaround exists; users must apply the update. This CVE is not listed in the CISA Known Exploited Vulnerabilities catalog.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

14

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.