VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8430

CVE-2015-8430

Description

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2015-8430 is a use-after-free in Adobe Flash Player's TextField.text setter enabling arbitrary code execution via a crafted SWF.

Vulnerability

CVE-2015-8430 is a use-after-free vulnerability in Adobe Flash Player affecting versions before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X, before 11.2.202.554 on Linux, and related Adobe AIR versions before 20.0.0.204 [1]. The vulnerability resides in the TextField.text setter; when setting the text to an object with a custom toString method, the toString function can free the parent object of the text field, which is subsequently used, leading to the use-after-free condition [2].

Exploitation

An attacker can exploit this by delivering a crafted SWF file that triggers the use-after-free. The provided proof-of-concept demonstrates the attack: a createTextField call is made, and its .text property is set to a JavaScript object with a toString function. Inside that function, the parent movie clip (mc) is removed via removeMovieClip(), freeing the underlying object. After the function returns, the freed memory is accessed [2]. No user interaction beyond loading the SWF file is required; a remote attacker can host the malicious SWF or inject it into a web page. The exploit can be used to achieve arbitrary code execution [1].

Impact

Successful exploitation allows a remote attacker to execute arbitrary code with the privileges of the affected Flash Player process [1]. This can lead to full system compromise, including data disclosure, installation of malware, or further escalation of privileges. The vulnerability also can cause a denial of service or bypass security restrictions [1].

Mitigation

Adobe patched this vulnerability with the release of Flash Player 20.0.0.228 (and corresponding versions for other platforms) in December 2015 [1]. Users should upgrade to the latest version as indicated by the vendor. The Gentoo security advisory recommends upgrading to version 11.2.202.559 for Linux [1]. There is no known workaround for unpatched versions [1]. The vulnerability is not listed on the CISA KEV as of the publication date.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

18

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.