CVE-2015-5119

Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and...

Basic Information

CVE State
PUBLISHED
Reserved Date
June 26, 2015
Published Date
July 08, 2015
Last Updated
February 04, 2025
Vendor
Adobe
Product
Flash Player
Description
Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
Tags
windows linux cisa metasploit_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2022-03-03 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2018-08-21 12:31:49 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-03-03 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

adobe_flash_hacking_team_uaf

Type: metasploit • Created: Unknown

Metasploit module for CVE-2015-5119

dangokyo/CVE-2015-5119

Type: github • Created: 2018-08-21 12:31:49 UTC • Stars: 3

CiscoCXSecurity/CVE-2015-5119_walkthrough

Type: github • Created: 2015-09-10 10:10:36 UTC • Stars: 13

Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough

jvazquez-r7/CVE-2015-5119

Type: github • Created: 2015-07-29 20:21:20 UTC • Stars: 12

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Proof of Concept Exploit Available

  • Added to KEVIntel

  • Detected by Metasploit