VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8427

CVE-2015-8427

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Adobe Flash Player's TextField.variable setter allows remote code execution; patched in versions 18.0.0.268, 20.0.0.228, and 11.2.202.554.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player's TextField.variable setter. [2] When a variable name set to an object with a custom toString function, that function can free the parent object (e.g., by removing the movie clip), leading to use of freed memory. This affects Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X, before 11.2.202.554 on Linux, and Adobe AIR before 20.0.0.204.

Exploitation

An attacker can exploit this by convincing a user to open a specially crafted SWF file. The PoC demonstrates setting tf.variable to an object whose toString function calls mc.removeMovieClip(), freeing the text field's parent and causing a use-after-free when the variable assignment completes. [2] No special user interaction beyond opening the file is required.

Impact

Successful exploitation allows arbitrary code execution in the context of the user running Flash Player, potentially leading to full system compromise, including installation of malware or data theft.

Mitigation

Adobe released updates for Flash Player (18.0.0.268, 20.0.0.228, 11.2.202.554) and AIR (20.0.0.204). [1] Gentoo users should upgrade to >=www-plugins/adobe-flash-11.2.202.559. [1] No workaround is available. Users should apply the patches immediately.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

16

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.