CVE-2015-5122
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
14/07/2015
Last modified:
17/11/2025
Description
Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:* | 13.0 (including) | 13.0.0.302 (including) |
| cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:* | 18.0 (including) | 18.0.0.203 (including) |
| cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:* | 18.0 (including) | 18.0.0.203 (including) |
| cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:* | 18.0 (including) | 18.0.0.204 (including) |
| cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_10:*:* | 18.0 (including) | 18.0.0.203 (including) |
| cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:* | 18.0 (including) | 18.0.0.203 (including) |
| cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* | 11.0 (including) | 11.2.202.481 (including) |
| cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://packetstormsecurity.com/files/132663/Adobe-Flash-opaqueBackground-Use-After-Free.html
- http://rhn.redhat.com/errata/RHSA-2015-1235.html
- http://www.kb.cert.org/vuls/id/338736
- http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_opaque_background_uaf
- http://www.securityfocus.com/bid/75712
- http://www.securitytracker.com/id/1032890
- http://www.us-cert.gov/ncas/alerts/TA15-195A
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952467
- https://helpx.adobe.com/security/products/flash-player/apsa15-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb15-18.html
- https://perception-point.io/2018/04/11/breaking-cfi-cve-2015-5122-coop/
- https://perception-point.io/new/breaking-cfi.php
- https://security.gentoo.org/glsa/201508-01
- https://www.exploit-db.com/exploits/37599/
- https://www.fireeye.com/blog/threat-research/2015/07/cve-2015-5122_-_seco.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://packetstormsecurity.com/files/132663/Adobe-Flash-opaqueBackground-Use-After-Free.html
- http://rhn.redhat.com/errata/RHSA-2015-1235.html
- http://www.kb.cert.org/vuls/id/338736
- http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_opaque_background_uaf
- http://www.securityfocus.com/bid/75712
- http://www.securitytracker.com/id/1032890
- http://www.us-cert.gov/ncas/alerts/TA15-195A
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952467
- https://helpx.adobe.com/security/products/flash-player/apsa15-04.html
- https://helpx.adobe.com/security/products/flash-player/apsb15-18.html
- https://perception-point.io/2018/04/11/breaking-cfi-cve-2015-5122-coop/
- https://perception-point.io/new/breaking-cfi.php
- https://security.gentoo.org/glsa/201508-01
- https://www.exploit-db.com/exploits/37599/
- https://www.fireeye.com/blog/threat-research/2015/07/cve-2015-5122_-_seco.html
- https://github.com/cisagov/vulnrichment/issues/196
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-5122



