VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8422

CVE-2015-8422

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Adobe Flash Player before 18.0.0.268/20.0.0.228 contains a use-after-free in TextField.setFormat, allowing arbitrary code execution.

Vulnerability

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x/20.x before 20.0.0.228 on Windows/OS X, and before 11.2.202.554 on Linux, as well as Adobe AIR before 20.0.0.204. The bug resides in the TextField.setFormat method when an integer parameter has valueOf defined or the object parameter overrides a constructor, leading to freeing of the TextField parent that is subsequently used [2].

Exploitation

An attacker can exploit this by crafting a malicious SWF file that calls setFormat with a specially crafted object that triggers the use-after-free. The attacker needs to entice a user to open the SWF in a vulnerable Flash Player. No authentication is required, and the attack can be remote via web delivery.

Impact

Successful exploitation could allow arbitrary code execution in the context of the user running the Flash Player, potentially leading to full system compromise.

Mitigation

Adobe released updates: Flash Player 20.0.0.228 (and earlier versions for legacy branches), AIR 20.0.0.204. Gentoo advisory recommends upgrading to at least 11.2.202.559 [1]. No workaround is available; users should update immediately.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

18

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.