CVE-2015-8042
Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted loadSound call, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Adobe Flash Player before 18.0.0.261/19.0.0.245 on Windows/OS X and 11.2.202.548 on Linux suffers from a use-after-free in Sound.loadSound, enabling arbitrary code execution.
Vulnerability
CVE-2015-8042 is a use-after-free vulnerability in Adobe Flash Player that exists in the handling of ActionScript 2 (AS2) Sound objects. By calling the loadSound method (a loadSound call), it is possible to trigger a use-after-free condition [3]. The flaw affects Flash Player versions before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X, and before 11.2.202.548 on Linux, as well as Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 [1][2][4].
Exploitation
Exploitation requires user interaction: the victim must visit a malicious web page or open a crafted SWF file. The attacker crafts a specially formed SWF that invokes the loadSound method on a Sound object in a way that frees memory while it is still referenced, leading to a use-after-free [3]. No special network position or authentication is necessary beyond delivering the malicious file to the target.
Impact
Successful exploitation allows an attacker to execute arbitrary code under the context of the current process (the Flash Player plugin or standalone player). This can lead to full compromise of the affected system, including potential data disclosure, denial of service, or further code execution [2][3]. The ZDI advisory notes that the CVSS score is 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) [3].
Mitigation
Adobe released fixed versions on November 10, 2015: Flash Player 18.0.0.261, 19.0.0.245, and 11.2.202.548, and AIR 19.0.0.241 [1][2][4]. Red Hat provided updated packages (flash-plugin 11.2.202.548) for Red Hat Enterprise Linux 5 and 6 Supplementary through RHSA-2015-2023 and RHSA-2015-2024 [1][2]. Gentoo users should upgrade to >=www-plugins/adobe-flash-11.2.202.548 [4]. There is no known workaround other than applying the updates.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
14- cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*Range: <=19.0.0.213
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*range: <=18.0.0.255
- cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
- Range: before 19.0.0.241
- Range: before 19.0.0.241
- Range: before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux
- osv-coords4 versionspkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012
< 11.2.202.548-0.26.1+ 3 more
- (no CPE)range: < 11.2.202.548-0.26.1
- (no CPE)range: < 11.2.202.548-0.26.1
- (no CPE)range: < 11.2.202.548-111.1
- (no CPE)range: < 11.2.202.548-111.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- helpx.adobe.com/security/products/flash-player/apsb15-28.htmlnvdPatchVendor Advisory
- lists.opensuse.org/opensuse-updates/2015-11/msg00071.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-2023.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-2024.htmlnvd
- www.securityfocus.com/bid/77533nvd
- www.securitytracker.com/id/1034111nvd
- www.zerodayinitiative.com/advisories/ZDI-15-563nvd
- security.gentoo.org/glsa/201511-02nvd
News mentions
0No linked articles in our index yet.