CVE-2015-8046
Description
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, and CVE-2015-8044.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Use-after-free in Flash Player's TextField antiAliasType setter allows arbitrary code execution via crafted SWF.
Vulnerability
A use-after-free vulnerability exists in Adobe Flash Player's TextField.antiAliasType setter [3]. When the setter is invoked with an object whose toString method frees the TextField instance, the property write occurs on freed memory [3]. This affects Flash Player versions before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X, before 11.2.202.548 on Linux, as well as Adobe AIR before 19.0.0.241, AIR SDK before 19.0.0.241, and AIR SDK & Compiler before 19.0.0.241 [1][2][4].
Exploitation
An attacker must deliver a specially crafted SWF file to a victim [2]. The SWF creates a TextField, sets its antiAliasType to an object with a custom toString method, and within that method removes the TextField (e.g., via removeMovieClip) [3]. After the removal, the setter continues writing to the now-freed memory region, triggering the use-after-free [3]. No additional authentication or privileges are required; the victim only needs to load the malicious SWF in a vulnerable Flash Player instance [2].
Impact
Successful exploitation allows an attacker to execute arbitrary code in the context of the user running the Flash Player, potentially leading to full system compromise [2][4]. The vulnerability can also cause a denial-of-service condition or sensitive information disclosure [2][4].
Mitigation
Adobe released fixed versions: Flash Player 18.0.0.261 and 19.0.0.245 for Windows/OS X, 11.2.202.548 for Linux, and AIR 19.0.0.241 [1][2][4]. Red Hat and Gentoo have also provided updated packages [1][2][4]. Users should update to these versions immediately; no workaround is available [4].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
15cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*range: <=19.0.0.213
- (no CPE)range: before 19.0.0.241
cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*range: <=19.0.0.213
- (no CPE)range: before 19.0.0.241
cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:*range: <=19.0.0.213
- (no CPE)range: before 19.0.0.241
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*range: <=18.0.0.255
- cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*
- Range: before 18.0.0.261 and 19.x before 19.0.0.245 (Windows/OS X); before 11.2.202.548 (Linux)
- osv-coords4 versionspkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/flash-player&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012
< 11.2.202.548-0.26.1+ 3 more
- (no CPE)range: < 11.2.202.548-0.26.1
- (no CPE)range: < 11.2.202.548-0.26.1
- (no CPE)range: < 11.2.202.548-111.1
- (no CPE)range: < 11.2.202.548-111.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- helpx.adobe.com/security/products/flash-player/apsb15-28.htmlnvdPatchVendor Advisory
- lists.opensuse.org/opensuse-updates/2015-11/msg00071.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-2023.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-2024.htmlnvd
- www.securityfocus.com/bid/77533nvd
- www.securitytracker.com/id/1034111nvd
- security.gentoo.org/glsa/201511-02nvd
- www.exploit-db.com/exploits/39019/nvd
News mentions
0No linked articles in our index yet.