VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8049

CVE-2015-8049

Description

Use-after-free vulnerability in the TextField object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted autoSize property value, a different vulnerability than CVE-2015-8048, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free in Adobe Flash TextField object, triggered via a crafted autoSize property, allows remote code execution when a user visits a malicious page.

Vulnerability

A use-after-free vulnerability exists in the TextField object implementation of Adobe Flash Player [1]. The bug is triggered by manipulating the autoSize property of a TextField object, which causes a dangling pointer to be used after the object is freed [1]. Affected versions include Flash Player before 18.0.0.268, 19.x and 20.x before 20.0.0.228 on Windows and OS X, and before 11.2.202.554 on Linux; Adobe AIR before 20.0.0.204, AIR SDK before 20.0.0.204, and AIR SDK & Compiler before 20.0.0.204 [2].

Exploitation

To exploit this vulnerability, an attacker must entice a user to visit a malicious web page or open a malicious file [1]. No additional authentication or write access is required beyond the user's interaction. The attacker supplies a crafted autoSize property value that triggers the use-after-free condition, leading to memory corruption that can be leveraged for arbitrary code execution [1].

Impact

Successful exploitation allows an attacker to execute arbitrary code in the context of the current process [1]. This can result in full compromise of the affected system, including the ability to install programs, view, change, or delete data, and create new accounts with full user rights. The CVSS score for this vulnerability is 6.8 (Medium) [1].

Mitigation

Adobe addressed this vulnerability by releasing updated versions of Flash Player, AIR, AIR SDK, and AIR SDK & Compiler [2]. The fixed versions are: Flash Player 20.0.0.228 (Windows and OS X), 18.0.0.268, and 11.2.202.559 (Linux); AIR 20.0.0.204; AIR SDK 20.0.0.204; and AIR SDK & Compiler 20.0.0.204 [2]. Users should upgrade to these patched versions immediately. No known workarounds are available [2].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

17

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.