Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 02:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/ - Broken Link, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=144050155601375&w=2 - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1235.html - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/918568 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/75710 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1032890 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/ncas/alerts/TA15-195A - Third Party Advisory, US Government Resource | |
References | () https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784 - Broken Link, Third Party Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsa15-04.html - Broken Link, Vendor Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsb15-18.html - Broken Link, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201508-01 - Third Party Advisory |
02 Jul 2024, 17:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
References | () http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/ - Broken Link, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/75710 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1032890 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784 - Broken Link, Third Party Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsa15-04.html - Broken Link, Vendor Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsb15-18.html - Broken Link, Vendor Advisory |
Information
Published : 2015-07-14 10:59
Updated : 2024-11-21 02:32
NVD link : CVE-2015-5123
Mitre link : CVE-2015-5123
CVE.ORG link : CVE-2015-5123
JSON object : View
Products Affected
adobe
- flash_player
- flash_player_desktop_runtime
linux
- linux_kernel
apple
- macos
microsoft
- windows
suse
- linux_enterprise_workstation_extension
- linux_enterprise_desktop
opensuse
- evergreen
redhat
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server
CWE
CWE-416
Use After Free