← Zuruck zu CVEs
CVE-2015-5119
CRITICALCISA KEV9.8
Beschreibung
Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht7/8/2015
Zuletzt geandert4/21/2026
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerAdobe
ProduktFlash Player
SchwachstellennameAdobe Flash Player Use-After-Free Vulnerability
KEV Aufnahmedatum2022-03-03
Behebungsfrist2022-03-24
Ransomware-NutzungUnknown
Betroffene Produkte
adobe:flash_playerapple:mac_os_xlinux:linux_kernelmicrosoft:windowsopensuse:evergreenopensuse:opensuseredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_from_rhuiredhat:enterprise_linux_workstationsuse:linux_enterprise_desktopsuse:linux_enterprise_workstation_extension
Schwachen (CWE)
CWE-416CWE-416
Referenzen
http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/(psirt@adobe.com)
http://rhn.redhat.com/errata/RHSA-2015-1214.html(psirt@adobe.com)
http://twitter.com/w3bd3vil/statuses/618168863708962816(psirt@adobe.com)
http://www.kb.cert.org/vuls/id/561288(psirt@adobe.com)
http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_hacking_team_uaf(psirt@adobe.com)
http://www.securityfocus.com/bid/75568(psirt@adobe.com)
http://www.securitytracker.com/id/1032809(psirt@adobe.com)
http://www.us-cert.gov/ncas/alerts/TA15-195A(psirt@adobe.com)
https://packetstormsecurity.com/files/132600/Adobe-Flash-Player-ByteArray-Use-After-Free.html(psirt@adobe.com)
https://security.gentoo.org/glsa/201507-13(psirt@adobe.com)
http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00015.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00016.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1214.html(af854a3a-2127-422b-91ae-364da2661108)
http://twitter.com/w3bd3vil/statuses/618168863708962816(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/561288(af854a3a-2127-422b-91ae-364da2661108)
http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_hacking_team_uaf(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/75568(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1032809(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/ncas/alerts/TA15-195A(af854a3a-2127-422b-91ae-364da2661108)
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html(af854a3a-2127-422b-91ae-364da2661108)
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html(af854a3a-2127-422b-91ae-364da2661108)
https://packetstormsecurity.com/files/132600/Adobe-Flash-Player-ByteArray-Use-After-Free.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201507-13(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/cisagov/vulnrichment/issues/196(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-5119(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.