Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
Recent assessments:
gwillcox-r7 at November 23, 2020 6:08pm UTC reported:
Reported as exploited in the wild as part of Googleβs 2020 0day vulnerability spreadsheet they made available at <https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=1869060786>. Original tweet announcing this spreadsheet with the 2020 findings can be found at <https://twitter.com/maddiestone/status/1329837665378725888>
Assessed Attacker Value: 0
Assessed Attacker Value: 0Assessed Attacker Value: 0
blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak
lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html
lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html
lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html
marc.info?l=bugtraq&m=144050155601375&w=2
rhn.redhat.com/errata/RHSA-2015-1235.html
www.kb.cert.org/vuls/id/918568
www.securityfocus.com/bid/75710
www.securitytracker.com/id/1032890
www.us-cert.gov/ncas/alerts/TA15-195A
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5123
h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784
helpx.adobe.com/security/products/flash-player/apsa15-04.html
helpx.adobe.com/security/products/flash-player/apsb15-18.html
security.gentoo.org/glsa/201508-01