VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8420

CVE-2015-8420

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Adobe Flash Player TextField sharpness setter allows arbitrary code execution via crafted SWF content.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player's TextField.sharpness setter. When the sharpness parameter is an object with a valueOf function that frees the parent TextField, the freed memory is subsequently used. This affects Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X, and before 11.2.202.554 on Linux, as well as Adobe AIR before 20.0.0.204 and corresponding SDK versions [1][2].

Exploitation

An attacker can exploit this by crafting a SWF file that sets tf.sharpness to an object whose valueOf method removes the TextField's parent movie clip, causing a use-after-free when the property is assigned. No authentication or special network position is required beyond hosting the malicious SWF or embedding it in a web page. The PoC triggers the vulnerability on the second call to valueOf [2].

Impact

Successful exploitation can lead to arbitrary code execution in the context of the user running the Flash Player. The attacker gains full control over the affected system, potentially leading to data exfiltration, malware installation, or further compromise [1][2].

Mitigation

Adobe released fixed versions: Flash Player 20.0.0.228 (Windows/OS X) and 11.2.202.559 (Linux), AIR 20.0.0.204, and corresponding SDK updates. Users should upgrade to these versions or later. This vulnerability is not known to be in active exploitation as of publication [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

17

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.