VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8412

CVE-2015-8412

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Flash Player's MovieClip.duplicateMovieClip allows remote code execution via crafted SWF content.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player's MovieClip.duplicateMovieClip method. When the depth or movie name parameter passed to this method is an object with custom toString or valueOf functions, the method can be made to free the MovieClip object and then later use it. This affects Adobe Flash Player before 18.0.0.268, 19.x and 20.x before 20.0.0.228 on Windows and OS X, and before 11.2.202.554 on Linux, as well as Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 [1][2].

Exploitation

An attacker can exploit this vulnerability by providing a crafted SWF file that triggers the use-after-free. Specifically, the attacker creates a MovieClip and calls duplicateMovieClip with an object parameter that overrides valueOf or toString. In the callback function, the attacker removes the original MovieClip (removeMovieClip), freeing the object. The Flash Player then continues to use the freed memory, leading to code execution. The attacker does not require any special network position beyond serving the SWF via a webpage or other means; user interaction (e.g., visiting a crafted page) is necessary. No authentication or write access is needed [2].

Impact

Successful exploitation allows an attacker to execute arbitrary code with the privileges of the user running the Flash Player. This can result in full compromise of confidentiality, integrity, and availability (CIA), including remote code execution, information disclosure, denial of service, or bypass of security restrictions [1][2].

Mitigation

Adobe released fixed versions on December 8, 2015: Flash Player 20.0.0.228, 18.0.0.268, and 11.2.202.554 (Linux), and AIR 20.0.0.204. The Gentoo Linux GLSA 201601-03 recommends upgrading to >=www-plugins/adobe-flash-11.2.202.559. No known workaround exists. The vulnerability is not listed on the CISA KEV as of the time of writing [1][2].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

17

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.