This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within Adobe Flash Player when processing JIT data, which could allow remote attackers to bypass ASLR via a malicious SWF file or web page.