VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8425

CVE-2015-8425

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Adobe Flash Player when a TextField's variable is updated with a custom toString method, allowing arbitrary code execution.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player versions prior to 18.0.0.268, 19.x and 20.x before 20.0.0.228 on Windows and OS X, and before 11.2.202.554 on Linux, as well as Adobe AIR and AIR SDK versions before 20.0.0.204. The flaw occurs when a TextField's variable property is set to a string value, and the TextField is updated via a timer. If the assigned value is an object with a custom toString method, and that method frees the parent MovieClip containing the TextField, a use-after-free condition arises [1].

Exploitation

An attacker can exploit this by crafting a malicious SWF file that sets up a TextField with a variable, then uses setInterval to repeatedly update that variable with an object whose toString method removes the parent MovieClip. On the second update, the freed memory is accessed, leading to code execution. The PoC provided creates an empty MovieClip, adds a TextField, sets its variable to a string, then periodically replaces that string with an object that has a toString function that removes the parent MovieClip after the first call [1]. No user interaction beyond loading the SWF is required, and the attacker does not need prior authentication.

Impact

Successful exploitation allows arbitrary code execution in the context of the affected Flash Player instance. An attacker could potentially gain full control of the user's system, including the ability to install programs, view, change, or delete data, or create new accounts with full user rights. The vulnerability is part of a large batch of Flash Player flaws disclosed in December 2015 [1][2].

Mitigation

Adobe released updates to address this vulnerability: Flash Player 20.0.0.228 (and 18.0.0.268 for older branches) for Windows and OS X, Flash Player 11.2.202.554 for Linux, and AIR 20.0.0.204. Gentoo Linux recommends upgrading to at least version 11.2.202.559 [2]. Users should update their Flash installations immediately. No workaround is known.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

17

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.