VYPR
Unrated severityNVD Advisory· Published Nov 11, 2015· Updated May 6, 2026

CVE-2015-7658

CVE-2015-7658

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionInstanceOf arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free vulnerability in Adobe Flash Player allows remote code execution via crafted actionInstanceOf arguments.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X, and before 11.2.202.548 on Linux, as well as in Adobe AIR before 19.0.0.241 [2][3]. The flaw resides in the actionInstanceOf opcode when processing crafted arguments, leading to a dangling pointer that can be reused after being freed [3].

Exploitation

Exploitation requires user interaction, such as visiting a malicious webpage or opening a crafted SWF file [3]. The attacker manipulates the arguments passed to the actionInstanceOf opcode to trigger a use-after-free condition, which can be leveraged to execute arbitrary code [3].

Impact

Successful exploitation allows an attacker to execute arbitrary code in the context of the current process, potentially leading to full system compromise [2][3].

Mitigation

Adobe released updates for Flash Player (18.0.0.261/19.0.0.245 on Windows and OS X, 11.2.202.548 on Linux) and AIR (19.0.0.241) [2][4]. Red Hat issued RHSA-2015-2024 to update the flash-plugin package [2]. Gentoo recommends upgrading to >=www-plugins/adobe-flash-11.2.202.548 [4]. No workaround is available [4].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

15

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.