VYPR
Unrated severityNVD Advisory· Published Dec 10, 2015· Updated May 6, 2026

CVE-2015-8449

CVE-2015-8449

Description

Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted lineTo method call, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Flash Player's MovieClip.lineTo method enables remote code execution; patched in versions 20.0.0.228, 18.0.0.268, and 11.2.202.554.

Vulnerability

CVE-2015-8449 is a use-after-free vulnerability in the MovieClip object implementation of Adobe Flash Player [1]. The flaw resides in how the lineTo method handles object lifetime. An attacker can craft a malicious SWF file that, when processed by Flash Player, triggers a dangling pointer after the associated memory has been freed. The affected versions are Flash Player before 18.0.0.268, 19.x and 20.x before 20.0.0.228 on Windows and OS X, and before 11.2.202.554 on Linux; Adobe AIR before 20.0.0.204, and corresponding AIR SDK/SDK & Compiler versions.

Exploitation

Exploitation requires user interaction: the target must visit a malicious web page or open a crafted file containing the vulnerable SWF content [1]. No additional authentication or special privileges are needed. The attacker triggers the flaw by calling the lineTo method on a MovieClip object in ActionScript 2, causing the reuse of a freed pointer [1]. This can be leveraged to corrupt memory and redirect execution flow.

Impact

Successful exploitation allows an attacker to execute arbitrary code in the context of the user running the Flash Player instance [1]. This leads to full compromise of the affected system, including potential data theft, malware installation, or further network propagation.

Mitigation

Adobe released fixed versions: Flash Player 20.0.0.228, 18.0.0.268, and 11.2.202.554 on Linux, as well as AIR 20.0.0.204, on December 8, 2015 [1][2]. Users should update to these or later versions. There is no known workaround; disabling or removing Flash Player if not needed also mitigates risk.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

17

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.