Intrusion Prevention

Adobe.Flash.ActionCallMethod.Use.After.Free

Description

This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Flash Player.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted SWF file. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted SWF file.

Affected Products

Adobe Flash Player Desktop Runtime 19.0.0.226 and earlier Windows and Macintosh
Adobe Flash Player Extended Support Release 18.0.0.255 and earlier Windows and Macintosh
Adobe Flash Player for Google Chrome 19.0.0.226 and earlier Windows, Macintosh, Linux and ChromeOS
Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.226 and earlier Windows 10
Adobe Flash Player for Internet Explorer 10 and 11 19.0.0.226 and earlier Windows 8.0 and 8.1
Adobe Flash Player for Linux 11.2.202.540 and earlier Linux
AIR Desktop Runtime 19.0.0.213 and earlier Windows and Macintosh
AIR SDK 19.0.0.213 and earlier Windows, Macintosh, Android and iOS
AIR SDK & Compiler 19.0.0.213 and earlier Windows, Macintosh, Android and iOS
AIR for Android 19.0.0.190 and earlier Android

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
https://helpx.adobe.com/security/products/flash-player/apsb15-28.html

CVE References

CVE-2015-7657

Other References

APSB15-28