CVE-2015-5571
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
22/09/2015
Last modified:
12/04/2025
Description
Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API. NOTE: this issue exists because of an incomplete fix for CVE-2014-4671 and CVE-2014-5333.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* | 11.2.202.508 (including) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:* | 18.0.0.199 (including) | |
| cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:* | 18.0.0.199 (including) | |
| cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:* | 18.0.0.180 (including) | |
| cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* | 13.0.0.289 (including) | |
| cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1814.html
- http://www.securityfocus.com/bid/76803
- http://www.securitytracker.com/id/1033629
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04939841
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://helpx.adobe.com/security/products/flash-player/apsb15-23.html
- https://security.gentoo.org/glsa/201509-07
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1814.html
- http://www.securityfocus.com/bid/76803
- http://www.securitytracker.com/id/1033629
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04939841
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://helpx.adobe.com/security/products/flash-player/apsb15-23.html
- https://security.gentoo.org/glsa/201509-07



