ID CVE-2015-5574
Summary Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5581, CVE-2015-5584, and CVE-2015-6682.
References
Vulnerable Configurations
  • Adobe Flash Player 13.0.0.289
    cpe:2.3:a:adobe:flash_player:13.0.0.289
  • Adobe Flash Player 14.0.0.125
    cpe:2.3:a:adobe:flash_player:14.0.0.125
  • Adobe Flash Player 14.0.0.145
    cpe:2.3:a:adobe:flash_player:14.0.0.145
  • Adobe Flash Player 14.0.0.176
    cpe:2.3:a:adobe:flash_player:14.0.0.176
  • Adobe Flash Player 14.0.0.179
    cpe:2.3:a:adobe:flash_player:14.0.0.179
  • Adobe Flash Player 15.0.0.152
    cpe:2.3:a:adobe:flash_player:15.0.0.152
  • Adobe Flash Player 15.0.0.167
    cpe:2.3:a:adobe:flash_player:15.0.0.167
  • Adobe Flash Player 15.0.0.189
    cpe:2.3:a:adobe:flash_player:15.0.0.189
  • Adobe Flash Player 15.0.0.223
    cpe:2.3:a:adobe:flash_player:15.0.0.223
  • Adobe Flash Player 15.0.0.239
    cpe:2.3:a:adobe:flash_player:15.0.0.239
  • Adobe Flash Player 15.0.0.246
    cpe:2.3:a:adobe:flash_player:15.0.0.246
  • Adobe Flash Player 16.0.0.235
    cpe:2.3:a:adobe:flash_player:16.0.0.235
  • Adobe Flash Player 16.0.0.257
    cpe:2.3:a:adobe:flash_player:16.0.0.257
  • Adobe Flash Player 16.0.0.287
    cpe:2.3:a:adobe:flash_player:16.0.0.287
  • Adobe Flash Player 16.0.0.296
    cpe:2.3:a:adobe:flash_player:16.0.0.296
  • Adobe Flash Player 17.0.0.134
    cpe:2.3:a:adobe:flash_player:17.0.0.134
  • Adobe Flash Player 17.0.0.169
    cpe:2.3:a:adobe:flash_player:17.0.0.169
  • Adobe Flash Player 17.0.0.188
    cpe:2.3:a:adobe:flash_player:17.0.0.188
  • Adobe Flash Player 17.0.0.190
    cpe:2.3:a:adobe:flash_player:17.0.0.190
  • Adobe Flash Player 17.0.0.191
    cpe:2.3:a:adobe:flash_player:17.0.0.191
  • Adobe Flash Player 18.0.0.160
    cpe:2.3:a:adobe:flash_player:18.0.0.160
  • Adobe Flash Player 18.0.0.194
    cpe:2.3:a:adobe:flash_player:18.0.0.194
  • Adobe Flash Player 18.0.0.203
    cpe:2.3:a:adobe:flash_player:18.0.0.203
  • Adobe Flash Player 18.0.0.209
    cpe:2.3:a:adobe:flash_player:18.0.0.209
  • Adobe Flash Player 18.0.0.232
    cpe:2.3:a:adobe:flash_player:18.0.0.232
  • Microsoft Windows
    cpe:2.3:o:microsoft:windows
  • Apple Mac OS X
    cpe:2.3:o:apple:mac_os_x
  • Adobe Flash Player 11.2.202.508
    cpe:2.3:a:adobe:flash_player:11.2.202.508
  • Linux Kernel
    cpe:2.3:o:linux:linux_kernel
  • cpe:2.3:a:adobe:air:18.0.0.143
    cpe:2.3:a:adobe:air:18.0.0.143
  • Google Android Operating System
    cpe:2.3:o:google:android
  • Adobe AIR SDK & Compiler 18.0.0.180
    cpe:2.3:a:adobe:air_sdk_%26_compiler:18.0.0.180
  • cpe:2.3:a:adobe:air_sdk:18.0.0.199
    cpe:2.3:a:adobe:air_sdk:18.0.0.199
  • cpe:2.3:a:adobe:air:18.0.0.199
    cpe:2.3:a:adobe:air:18.0.0.199
  • Apple Mac OS X
    cpe:2.3:o:apple:mac_os_x
  • Microsoft Windows
    cpe:2.3:o:microsoft:windows
CVSS
Base: 10.0 (as of 25-08-2016 - 12:01)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
description Adobe Flash - Color.setTransform Use-After-Free. CVE-2015-5574. Dos exploits for multiple platform
file exploits/multiple/dos/39652.txt
id EDB-ID:39652
last seen 2016-04-01
modified 2016-04-01
platform multiple
port
published 2016-04-01
reporter Google Security Research
source https://www.exploit-db.com/download/39652/
title Adobe Flash - Color.setTransform Use-After-Free
type dos
nessus via4
  • NASL family Windows
    NASL id SMB_KB3087040.NASL
    description The remote Windows host is missing KB3087040. It is, therefore, affected by multiple vulnerabilities : - An unspecified stack corruption issue exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5567, CVE-2015-5579) - A vector length corruption issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5568) - A use-after-free error exists in an unspecified component due to improperly sanitized user-supplied input. A remote attacker can exploit this, via a specially crafted file, to deference already freed memory and execute arbitrary code. (CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, CVE-2015-6682) - An unspecified flaw exists due to a failure to reject content from vulnerable JSONP callback APIs. A remote attacker can exploit this to have an unspecified impact. (CVE-2015-5571) - An unspecified flaw exists that allows a remote attacker to bypass security restrictions and gain access to sensitive information. (CVE-2015-5572) - An unspecified type confusion flaw exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5573) - A flaw exists in an unspecified component due to improper validation of user-supplied input when handling a specially crafted file. A remote attacker can exploit this to corrupt memory, resulting in a denial of service or the execution of arbitrary code. (CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, CVE-2015-6677) - A memory leak issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5576) - A stack buffer overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-5587) - An unspecified overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-6676, CVE-2015-6678) - An unspecified flaw exists that allows a remote attacker to bypass same-origin policy restrictions and gain access to sensitive information. (CVE-2015-6679)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 86065
    published 2015-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86065
    title MS KB3087040: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201509-07.NASL
    description The remote host is affected by the vulnerability described in GLSA-201509-07 (Adobe Flash Player: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-06-29
    plugin id 91735
    published 2016-06-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91735
    title GLSA-201509-07 : Adobe Flash Player: Multiple vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_FLASH_PLAYER_APSB15-23.NASL
    description The version of Adobe Flash Player installed on the remote Mac OS X host is equal or prior to version 18.0.0.232. It is, therefore, affected by multiple vulnerabilities : - An unspecified stack corruption issue exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5567, CVE-2015-5579) - A vector length corruption issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5568) - A use-after-free error exists in an unspecified component due to improperly sanitized user-supplied input. A remote attacker can exploit this, via a specially crafted file, to deference already freed memory and execute arbitrary code. (CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, CVE-2015-6682) - An unspecified flaw exists due to a failure to reject content from vulnerable JSONP callback APIs. A remote attacker can exploit this to have an unspecified impact. (CVE-2015-5571) - An unspecified flaw exists that allows a remote attacker to bypass security restrictions and gain access to sensitive information. (CVE-2015-5572) - An unspecified type confusion flaw exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5573) - A flaw exists in an unspecified component due to improper validation of user-supplied input when handling a specially crafted file. A remote attacker can exploit this to corrupt memory, resulting in a denial of service or the execution of arbitrary code. (CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, CVE-2015-6677) - A memory leak issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5576) - A stack buffer overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-5587) - An unspecified overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-6676, CVE-2015-6678) - An unspecified flaw exists that allows a remote attacker to bypass same-origin policy restrictions and gain access to sensitive information. (CVE-2015-6679)
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 86063
    published 2015-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86063
    title Adobe Flash Player for Mac <= 18.0.0.232 Multiple Vulnerabilities (APSB15-23)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_4E3E8A5065C111E5948EBCAEC565249C.NASL
    description Adobe reports : These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-5573). These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, CVE-2015-6682). These updates resolve buffer overflow vulnerabilities that could lead to code execution (CVE-2015-6676, CVE-2015-6678). These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, CVE-2015-6677). These updates include additional validation checks to ensure that Flash Player rejects malicious content from vulnerable JSONP callback APIs (CVE-2015-5571). These updates resolve a memory leak vulnerability (CVE-2015-5576). These updates include further hardening to a mitigation to defend against vector length corruptions (CVE-2015-5568). These updates resolve stack corruption vulnerabilities that could lead to code execution (CVE-2015-5567, CVE-2015-5579). These updates resolve a stack overflow vulnerability that could lead to code execution (CVE-2015-5587). These updates resolve a security bypass vulnerability that could lead to information disclosure (CVE-2015-5572). These updates resolve a vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-6679).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 86188
    published 2015-09-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86188
    title FreeBSD : flash -- multiple vulnerabilities (4e3e8a50-65c1-11e5-948e-bcaec565249c)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_ADOBE_AIR_APSB15-23.NASL
    description The version of Adobe AIR installed on the remote Mac OS X host is equal or prior to version 18.0.0.199. It is, therefore, affected by multiple vulnerabilities : - An unspecified stack corruption issue exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5567, CVE-2015-5579) - A vector length corruption issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5568) - A use-after-free error exists in an unspecified component due to improperly sanitized user-supplied input. A remote attacker can exploit this, via a specially crafted file, to deference already freed memory and execute arbitrary code. (CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, CVE-2015-6682) - An unspecified flaw exists due to a failure to reject content from vulnerable JSONP callback APIs. A remote attacker can exploit this to have an unspecified impact. (CVE-2015-5571) - An unspecified flaw exists that allows a remote attacker to bypass security restrictions and gain access to sensitive information. (CVE-2015-5572) - An unspecified type confusion flaw exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5573) - A flaw exists in an unspecified component due to improper validation of user-supplied input when handling a specially crafted file. A remote attacker can exploit this to corrupt memory, resulting in a denial of service or the execution of arbitrary code. (CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, CVE-2015-6677) - A memory leak issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5576) - A stack buffer overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-5587) - An unspecified overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-6676, CVE-2015-6678) - An unspecified flaw exists that allows a remote attacker to bypass same-origin policy restrictions and gain access to sensitive information. (CVE-2015-6679)
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 86062
    published 2015-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86062
    title Adobe AIR for Mac <= 18.0.0.199 Multiple Vulnerabilities (APSB15-23)
  • NASL family Windows
    NASL id FLASH_PLAYER_APSB15-23.NASL
    description The version of Adobe Flash Player installed on the remote Windows host is equal or prior to version 18.0.0.232. It is, therefore, affected by multiple vulnerabilities : - An unspecified stack corruption issue exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5567, CVE-2015-5579) - A vector length corruption issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5568) - A use-after-free error exists in an unspecified component due to improperly sanitized user-supplied input. A remote attacker can exploit this, via a specially crafted file, to deference already freed memory and execute arbitrary code. (CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, CVE-2015-6682) - An unspecified flaw exists due to a failure to reject content from vulnerable JSONP callback APIs. A remote attacker can exploit this to have an unspecified impact. (CVE-2015-5571) - An unspecified flaw exists that allows a remote attacker to bypass security restrictions and gain access to sensitive information. (CVE-2015-5572) - An unspecified type confusion flaw exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5573) - A flaw exists in an unspecified component due to improper validation of user-supplied input when handling a specially crafted file. A remote attacker can exploit this to corrupt memory, resulting in a denial of service or the execution of arbitrary code. (CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, CVE-2015-6677) - A memory leak issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5576) - A stack buffer overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-5587) - An unspecified overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-6676, CVE-2015-6678) - An unspecified flaw exists that allows a remote attacker to bypass same-origin policy restrictions and gain access to sensitive information. (CVE-2015-6679)
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 86060
    published 2015-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86060
    title Adobe Flash Player <= 18.0.0.232 Multiple Vulnerabilities (APSB15-23)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-1614-1.NASL
    description Adobe Flash Player was updated to 11.2.202.521 (APSB15-23 bsc#946880) fixing several security issues : More information can be found on : https://helpx.adobe.com/security/products/flash-player/apsb15-23.html Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 86141
    published 2015-09-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86141
    title SUSE SLED11 Security Update : flash-player (SUSE-SU-2015:1614-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2015-603.NASL
    description Adobe Flash Player was updated to 11.2.202.521 (APSB15-23 bsc#946880) fixing several security issues : More information can be found on : https://helpx.adobe.com/security/products/flash-player/apsb15-23.html
    last seen 2019-02-21
    modified 2018-06-29
    plugin id 86120
    published 2015-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86120
    title openSUSE Security Update : flash-player (openSUSE-2015-603)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2015-1814.NASL
    description An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin APSB15-23 listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2015-5567, CVE-2015-5568, CVE-2015-5570, CVE-2015-5571, CVE-2015-5572, CVE-2015-5573, CVE-2015-5574, CVE-2015-5575, CVE-2015-5576, CVE-2015-5577, CVE-2015-5578, CVE-2015-5579, CVE-2015-5580, CVE-2015-5581, CVE-2015-5582, CVE-2015-5584, CVE-2015-5587, CVE-2015-5588, CVE-2015-6676, CVE-2015-6677, CVE-2015-6678, CVE-2015-6679, CVE-2015-6682) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.521.
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 86097
    published 2015-09-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86097
    title RHEL 5 / 6 : flash-plugin (RHSA-2015:1814)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_GOOGLE_CHROME_45_0_2454_99.NASL
    description The version of Google Chrome installed on the remote Mac OS X host is prior to 45.0.2454.99. It is, therefore, affected by multiple vulnerabilities : - An unspecified stack corruption issue exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5567, CVE-2015-5579) - A vector length corruption issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5568) - A use-after-free error exists in an unspecified component due to improperly sanitized user-supplied input. A remote attacker can exploit this, via a specially crafted file, to deference already freed memory and execute arbitrary code. (CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, CVE-2015-6682) - An unspecified flaw exists due to a failure to reject content from vulnerable JSONP callback APIs. A remote attacker can exploit this to have an unspecified impact. (CVE-2015-5571) - An unspecified flaw exists that allows a remote attacker to bypass security restrictions and gain access to sensitive information. (CVE-2015-5572) - An unspecified type confusion flaw exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5573) - A flaw exists in an unspecified component due to improper validation of user-supplied input when handling a specially crafted file. A remote attacker can exploit this to corrupt memory, resulting in a denial of service or the execution of arbitrary code. (CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, CVE-2015-6677) - A memory leak issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5576) - A stack buffer overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-5587) - An unspecified overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-6676, CVE-2015-6678) - An unspecified flaw exists that allows a remote attacker to bypass same-origin policy restrictions and gain access to sensitive information. (CVE-2015-6679)
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 86064
    published 2015-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86064
    title Google Chrome < 45.0.2454.99 Multiple Vulnerabilities (Mac OS X)
  • NASL family Windows
    NASL id ADOBE_AIR_APSB15-23.NASL
    description The version of Adobe AIR installed on the remote Windows host is equal or prior to version 18.0.0.199. It is, therefore, affected by multiple vulnerabilities : - An unspecified stack corruption issue exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5567, CVE-2015-5579) - A vector length corruption issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5568) - A use-after-free error exists in an unspecified component due to improperly sanitized user-supplied input. A remote attacker can exploit this, via a specially crafted file, to deference already freed memory and execute arbitrary code. (CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, CVE-2015-6682) - An unspecified flaw exists due to a failure to reject content from vulnerable JSONP callback APIs. A remote attacker can exploit this to have an unspecified impact. (CVE-2015-5571) - An unspecified flaw exists that allows a remote attacker to bypass security restrictions and gain access to sensitive information. (CVE-2015-5572) - An unspecified type confusion flaw exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5573) - A flaw exists in an unspecified component due to improper validation of user-supplied input when handling a specially crafted file. A remote attacker can exploit this to corrupt memory, resulting in a denial of service or the execution of arbitrary code. (CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, CVE-2015-6677) - A memory leak issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5576) - A stack buffer overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-5587) - An unspecified overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-6676, CVE-2015-6678) - An unspecified flaw exists that allows a remote attacker to bypass same-origin policy restrictions and gain access to sensitive information. (CVE-2015-6679)
    last seen 2019-02-21
    modified 2018-06-27
    plugin id 86059
    published 2015-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86059
    title Adobe AIR <= 18.0.0.199 Multiple Vulnerabilities (APSB15-23)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2015-1618-1.NASL
    description Adobe Flash Player was updated to 11.2.202.521 (APSB15-23 bsc#946880) fixing several security issues : More information can be found on : https://helpx.adobe.com/security/products/flash-player/apsb15-23.html Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 86142
    published 2015-09-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86142
    title SUSE SLED12 Security Update : flash-player (SUSE-SU-2015:1618-1)
  • NASL family Windows
    NASL id GOOGLE_CHROME_45_0_2454_99.NASL
    description The version of Google Chrome installed on the remote Windows host is prior to 45.0.2454.99. It is, therefore, affected by multiple vulnerabilities : - An unspecified stack corruption issue exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5567, CVE-2015-5579) - A vector length corruption issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5568) - A use-after-free error exists in an unspecified component due to improperly sanitized user-supplied input. A remote attacker can exploit this, via a specially crafted file, to deference already freed memory and execute arbitrary code. (CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, CVE-2015-6682) - An unspecified flaw exists due to a failure to reject content from vulnerable JSONP callback APIs. A remote attacker can exploit this to have an unspecified impact. (CVE-2015-5571) - An unspecified flaw exists that allows a remote attacker to bypass security restrictions and gain access to sensitive information. (CVE-2015-5572) - An unspecified type confusion flaw exists that allows a remote attacker to execute arbitrary code. (CVE-2015-5573) - A flaw exists in an unspecified component due to improper validation of user-supplied input when handling a specially crafted file. A remote attacker can exploit this to corrupt memory, resulting in a denial of service or the execution of arbitrary code. (CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, CVE-2015-6677) - A memory leak issue exists that allows a remote attacker to have an unspecified impact. (CVE-2015-5576) - A stack buffer overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-5587) - An unspecified overflow condition exists due to improper validation of user-supplied input. A remote attacker can exploit this to execute arbitrary code. (CVE-2015-6676, CVE-2015-6678) - An unspecified flaw exists that allows a remote attacker to bypass same-origin policy restrictions and gain access to sensitive information. (CVE-2015-6679)
    last seen 2019-02-21
    modified 2018-07-13
    plugin id 86061
    published 2015-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86061
    title Google Chrome < 45.0.2454.99 Multiple Vulnerabilities
redhat via4
advisories
rhsa
id RHSA-2015:1814
refmap via4
bid 76795
confirm
exploit-db 39652
gentoo GLSA-201509-07
sectrack 1033629
suse
  • SUSE-SU-2015:1614
  • SUSE-SU-2015:1618
  • openSUSE-SU-2015:1616
  • openSUSE-SU-2015:1781
the hacker news via4
id THN:6E4439AE509863A641FE11F3A4728CDB
last seen 2018-01-27
modified 2015-09-23
published 2015-09-22
reporter Swati Khandelwal
source https://thehackernews.com/2015/09/adobe-flash-player.html
title Adobe Releases 23 Security Updates for Flash Player
Last major update 16-02-2017 - 21:59
Published 22-09-2015 - 06:59
Last modified 07-09-2017 - 21:29
Back to Top