VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8448

CVE-2015-8448

Description

Use-after-free vulnerability in the DisplacementMapFilter object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted mapBitmap property value, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Adobe Flash Player's DisplacementMapFilter object allows remote code execution via crafted mapBitmap property.

Vulnerability

CVE-2015-8448 is a use-after-free vulnerability in the DisplacementMapFilter object of Adobe Flash Player. Affected versions include Flash Player before 18.0.0.268, 19.x and 20.x before 20.0.0.228 on Windows and OS X, and before 11.2.202.554 on Linux, as well as Adobe AIR before 20.0.0.204 and associated SDKs. The flaw is triggered by manipulating the mapBitmap property, causing a dangling pointer to be reused after the object has been freed [1].

Exploitation

An attacker requires user interaction, such as visiting a malicious webpage or opening a crafted SWF file. No authentication or prior access is needed. The exploit involves setting a specially crafted mapBitmap property on a DisplacementMapFilter object, which forces a use-after-free condition that can be leveraged to execute arbitrary code within the Flash Player process [1].

Impact

Successful exploitation allows arbitrary code execution in the context of the current process, which typically runs with the privileges of the user. This can lead to full system compromise, including data theft, installation of malware, and further propagation. The CVSS v2 score is 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P), indicating partial confidentiality, integrity, and availability impact [1][2].

Mitigation

Adobe released fixed versions: Flash Player 18.0.0.268, 20.0.0.228, and Linux 11.2.202.554; Adobe AIR 20.0.0.204. Users should update to these or later versions. Gentoo Linux recommends upgrading to >=www-plugins/adobe-flash-11.2.202.559 [2]. No workarounds are available beyond applying the patch [2].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

16

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.