← Voltar para CVEs
CVE-2015-5119
CRITICALCISA KEV9.8
Descricao
Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado7/8/2015
Ultima modificacao4/21/2026
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorAdobe
ProdutoFlash Player
Nome da vulnerabilidadeAdobe Flash Player Use-After-Free Vulnerability
Data inclusao KEV2022-03-03
Prazo de remediacao2022-03-24
Uso em ransomwareUnknown
Produtos afetados
adobe:flash_playerapple:mac_os_xlinux:linux_kernelmicrosoft:windowsopensuse:evergreenopensuse:opensuseredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_from_rhuiredhat:enterprise_linux_workstationsuse:linux_enterprise_desktopsuse:linux_enterprise_workstation_extension
Fraquezas (CWE)
CWE-416CWE-416
Referencias
http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/(psirt@adobe.com)
http://rhn.redhat.com/errata/RHSA-2015-1214.html(psirt@adobe.com)
http://twitter.com/w3bd3vil/statuses/618168863708962816(psirt@adobe.com)
http://www.kb.cert.org/vuls/id/561288(psirt@adobe.com)
http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_hacking_team_uaf(psirt@adobe.com)
http://www.securityfocus.com/bid/75568(psirt@adobe.com)
http://www.securitytracker.com/id/1032809(psirt@adobe.com)
http://www.us-cert.gov/ncas/alerts/TA15-195A(psirt@adobe.com)
https://packetstormsecurity.com/files/132600/Adobe-Flash-Player-ByteArray-Use-After-Free.html(psirt@adobe.com)
https://security.gentoo.org/glsa/201507-13(psirt@adobe.com)
http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00015.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00016.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-1214.html(af854a3a-2127-422b-91ae-364da2661108)
http://twitter.com/w3bd3vil/statuses/618168863708962816(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/561288(af854a3a-2127-422b-91ae-364da2661108)
http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_hacking_team_uaf(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/75568(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1032809(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/ncas/alerts/TA15-195A(af854a3a-2127-422b-91ae-364da2661108)
https://helpx.adobe.com/security/products/flash-player/apsa15-03.html(af854a3a-2127-422b-91ae-364da2661108)
https://helpx.adobe.com/security/products/flash-player/apsb15-16.html(af854a3a-2127-422b-91ae-364da2661108)
https://packetstormsecurity.com/files/132600/Adobe-Flash-Player-ByteArray-Use-After-Free.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201507-13(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/cisagov/vulnrichment/issues/196(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-5119(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.