← Zuruck zu CVEs
CVE-2015-5123
CRITICALCISA KEV9.8
Beschreibung
Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht7/14/2015
Zuletzt geandert11/17/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerAdobe
ProduktFlash Player
SchwachstellennameAdobe Flash Player Use-After-Free Vulnerability
KEV Aufnahmedatum2022-04-13
Behebungsfrist2022-05-04
Ransomware-NutzungUnknown
Betroffene Produkte
adobe:flash_playeradobe:flash_player_desktop_runtimeapple:macoslinux:linux_kernelmicrosoft:windowsopensuse:evergreenredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_eusredhat:enterprise_linux_workstationsuse:linux_enterprise_desktopsuse:linux_enterprise_workstation_extension
Schwachen (CWE)
CWE-416CWE-416
Referenzen
http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/(psirt@adobe.com)
http://marc.info/?l=bugtraq&m=144050155601375&w=2(psirt@adobe.com)
http://rhn.redhat.com/errata/RHSA-2015-1235.html(psirt@adobe.com)
http://www.kb.cert.org/vuls/id/918568(psirt@adobe.com)
http://www.securityfocus.com/bid/75710(psirt@adobe.com)
http://www.securitytracker.com/id/1032890(psirt@adobe.com)
http://www.us-cert.gov/ncas/alerts/TA15-195A(psirt@adobe.com)
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784(psirt@adobe.com)
https://security.gentoo.org/glsa/201508-01(psirt@adobe.com)
http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=144050155601375&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1235.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/918568(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/75710(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1032890(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/ncas/alerts/TA15-195A(af854a3a-2127-422b-91ae-364da2661108)
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784(af854a3a-2127-422b-91ae-364da2661108)
https://helpx.adobe.com/security/products/flash-player/apsa15-04.html(af854a3a-2127-422b-91ae-364da2661108)
https://helpx.adobe.com/security/products/flash-player/apsb15-18.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201508-01(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/cisagov/vulnrichment/issues/196(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-5123(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.