VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8048

CVE-2015-8048

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free vulnerability in Adobe Flash Player's URLStream.readObject allows arbitrary code execution via a crafted SWF file.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player's URLStream.readObject method. When reading a serialized object of a registered class, the class constructor is invoked. If the constructor calls URLStream.close(), the URLStream object is freed, but subsequent deserialization code continues to write to the freed memory, leading to a use-after-free condition [1]. This affects Flash Player versions before 18.0.0.268 and 19.x, 20.x before 20.0.0.228 on Windows and OS X, and before 11.2.202.554 on Linux, as well as Adobe AIR versions before 20.0.0.204 [2].

Exploitation

Exploitation requires an attacker to deliver a crafted SWF file that triggers the vulnerable code path. The attacker must register a class alias and define a class whose constructor calls URLStream.close() on a global reference. The SWF then loads a file and calls readObject() on a URLStream. When the deserialized object is of the registered class, the constructor executes, freeing the stream, and the subsequent write operation accesses freed memory. This can be leveraged to execute arbitrary code [1].

Impact

Successful exploitation allows arbitrary code execution in the context of the user running Flash Player. An attacker could gain full control over the affected system [2]. The vulnerability is considered critical with no authentication required.

Mitigation

Adobe has released fixed versions: Flash Player 20.0.0.228 (Windows/OS X), 18.0.0.268 (Windows/OS X), and 11.2.202.554 (Linux). Adobe AIR updated to 20.0.0.204. Users should upgrade immediately. For Linux, Gentoo recommends version 11.2.202.559 (later patch) [2]. No workarounds are available.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

18

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.