#VU5482 Memory corruption in Adobe products - CVE-2015-3117
Published: January 30, 2017 / Updated: February 23, 2017
Adobe AIR
Adobe Flash Player for Linux
Adobe Flash Player
Adobe Flash Player Extended Support Release
Adobe
Description
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.