CVE-2015-5576
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
22/09/2015
Last modified:
12/04/2025
Description
Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:* | 18.0.0.199 (including) | |
| cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:* | 18.0.0.199 (including) | |
| cpe:2.3:a:adobe:air_sdk_\&_compiler:*:*:*:*:*:*:*:* | 18.0.0.180 (including) | |
| cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* | 13.0.0.289 (including) | |
| cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1814.html
- http://www.securityfocus.com/bid/76802
- http://www.securitytracker.com/id/1033629
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04939841
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://helpx.adobe.com/security/products/flash-player/apsb15-23.html
- https://security.gentoo.org/glsa/201509-07
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1814.html
- http://www.securityfocus.com/bid/76802
- http://www.securitytracker.com/id/1033629
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04939841
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://helpx.adobe.com/security/products/flash-player/apsb15-23.html
- https://security.gentoo.org/glsa/201509-07



