VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8447

CVE-2015-8447

Description

Use-after-free vulnerability in the Color object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted setTransform arguments, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free in Adobe Flash Player's Color.setTransform allows remote code execution via crafted arguments.

Vulnerability

A use-after-free vulnerability exists in the Color object implementation of Adobe Flash Player [1]. The flaw is triggered by manipulating arguments passed to the setTransform method of a Color object, causing a dangling pointer to be reused after it has been freed. Affected versions include Adobe Flash Player before 18.0.0.268, 19.x and 20.x before 20.0.0.228 (Windows and OS X), before 11.2.202.554 (Linux), Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204. This is one of many similar issues disclosed in the December 2015 security bulletin.

Exploitation

An attacker must host a malicious SWF file and convince a user to visit a malicious page or open the file [1]. No additional authentication or network position is required beyond delivering the crafted Flash content. The exploit leverages the use-after-free condition by passing specific arguments to setTransform on a Color object, thereby gaining control of program flow.

Impact

Successful exploitation allows an attacker to execute arbitrary code in the context of the current process [1]. This can lead to full system compromise, including data theft, installation of malware, or further escalation. The CVSS score of 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) reflects partial impacts to confidentiality, integrity, and availability.

Mitigation

Adobe released fixed versions on December 8, 2015 [1]. Users should upgrade to Flash Player 20.0.0.228 (or 18.0.0.268 for legacy branches), AIR 20.0.0.204, or Linux Flash Player 11.2.202.554. Gentoo users can upgrade to >=www-plugins/adobe-flash-11.2.202.559 [2]. No workaround is available; the only mitigation is to apply the patch or disable Flash.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

17

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.