VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8429

CVE-2015-8429

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Adobe Flash Player use-after-free in TextField.type setter allows arbitrary code execution via crafted SWF.

Vulnerability

A use-after-free vulnerability exists in Adobe Flash Player's TextField.type setter, affecting versions before 18.0.0.268, 19.x and 20.x before 20.0.0.228 on Windows and OS X, and before 11.2.202.554 on Linux, as well as Adobe AIR before 20.0.0.204 and related SDKs [2]. When the type property is set to an object with a custom toString method, the toString function can remove the parent movie clip, freeing the TextField object, which is then still used after the free [2].

Exploitation

An attacker can trigger the vulnerability by persuading a user to open a specially crafted SWF file [2]. The proof-of-concept involves creating a movie clip and a text field, then setting the type property to an object with toString defined. The toString function calls removeMovieClip() on the parent, freeing the text field, after which the TextField.type setter continues to use the freed memory [2]. Exploitation requires no authentication beyond user interaction to load the SWF.

Impact

Successful exploitation allows arbitrary code execution in the context of the user running the Flash Player [1]. An attacker could execute arbitrary commands, potentially leading to full system compromise, including information disclosure, installation of malware, or denial of service [1].

Mitigation

Adobe released fixed versions: Flash Player 20.0.0.228 (Windows/OS X), 11.2.202.559 (Linux), and AIR 20.0.0.204 [1][2]. Users should update to the latest versions. The Gentoo GLSA recommends upgrading to www-plugins/adobe-flash-11.2.202.559 [1]. No workaround is available [1]. This CVE is not listed in the CISA Known Exploited Vulnerabilities catalog as of this writing.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

18

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.