Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 02:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=144050155601375&w=2 - Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/132663/Adobe-Flash-opaqueBackground-Use-After-Free.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1235.html - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/338736 - Third Party Advisory, US Government Resource | |
References | () http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_opaque_background_uaf - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/75712 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1032890 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/ncas/alerts/TA15-195A - Third Party Advisory, US Government Resource | |
References | () https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784 - Broken Link, Third Party Advisory | |
References | () https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952467 - Third Party Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsa15-04.html - Broken Link, Vendor Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsb15-18.html - Broken Link, Vendor Advisory | |
References | () https://perception-point.io/2018/04/11/breaking-cfi-cve-2015-5122-coop/ - Broken Link, Third Party Advisory | |
References | () https://perception-point.io/new/breaking-cfi.php - Broken Link, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201508-01 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/37599/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.fireeye.com/blog/threat-research/2015/07/cve-2015-5122_-_seco.html - Broken Link, Third Party Advisory |
02 Jul 2024, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
References | () http://packetstormsecurity.com/files/132663/Adobe-Flash-opaqueBackground-Use-After-Free.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/75712 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1032890 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784 - Broken Link, Third Party Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsa15-04.html - Broken Link, Vendor Advisory | |
References | () https://helpx.adobe.com/security/products/flash-player/apsb15-18.html - Broken Link, Vendor Advisory | |
References | () https://perception-point.io/2018/04/11/breaking-cfi-cve-2015-5122-coop/ - Broken Link, Third Party Advisory | |
References | () https://perception-point.io/new/breaking-cfi.php - Broken Link, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/37599/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.fireeye.com/blog/threat-research/2015/07/cve-2015-5122_-_seco.html - Broken Link, Third Party Advisory |
08 May 2023, 13:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:* |
08 Sep 2021, 17:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
Information
Published : 2015-07-14 10:59
Updated : 2024-11-21 02:32
NVD link : CVE-2015-5122
Mitre link : CVE-2015-5122
CVE.ORG link : CVE-2015-5122
JSON object : View
Products Affected
apple
- macos
microsoft
- windows
- windows_8
- windows_8.1
redhat
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_server
opensuse
- evergreen
suse
- linux_enterprise_workstation_extension
- linux_enterprise_desktop
adobe
- flash_player_desktop_runtime
- flash_player
linux
- linux_kernel
CWE
CWE-416
Use After Free