VYPR
Unrated severityNVD Advisory· Published Nov 11, 2015· Updated May 6, 2026

CVE-2015-7653

CVE-2015-7653

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted globalToLocal arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Adobe Flash Player's MovieClip.globalToLocal method has a use-after-free that allows arbitrary code execution via crafted arguments.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player versions before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X, and before 11.2.202.548 on Linux, as well as Adobe AIR before 19.0.0.241. The flaw resides in the MovieClip object's globalToLocal method. By supplying crafted arguments to globalToLocal, an attacker can force a dangling pointer to be reused after the associated memory has been freed [3]. This code path is reachable when the victim interacts with a malicious SWF file [3].

Exploitation

Exploitation requires user interaction: the target must visit a malicious webpage or open a malicious SWF file [3]. An attacker with no prior authentication can host a crafted SWF on a website or deliver it via email. Once the victim loads the content, the attacker's arguments to globalToLocal trigger a use-after-free condition [3]. The exact sequence involves manipulating the arguments to cause a dangling pointer to be reused, which can then be controlled to hijack execution flow [3].

Impact

Successful exploitation allows an attacker to execute arbitrary code within the context of the current process, typically the browser or Flash Player plugin [3]. This can lead to complete compromise of the user's system, including the ability to install programs, view, change, or delete data, or create new accounts with full user rights. The impact is rated as critical, with a CVSS score of 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) [3].

Mitigation

Adobe released patched versions: Flash Player 18.0.0.261, 19.0.0.245, and 11.2.202.548 for Linux; AIR 19.0.0.241. Red Hat issued RHSA-2015-2023 and RHSA-2015-2024 to update the flash-plugin package to 11.2.202.548 [1][2]. Gentoo provided GLSA 201511-02 recommending upgrade to >=11.2.202.548 [4]. Users should apply updates immediately; no workaround is available [4].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

13

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.