Flash Player For Mac <= Unspecified Code Execution (APSA15-01)

High Nessus Plugin ID 80999


The remote Mac OS X host has a browser plugin that is affected by multiple code execution vulnerabilities.


According to its version, the Adobe Flash Player installed on the remote Mac OS X host is equal or prior to It is, therefore, affected by the following vulnerabilities :

- A use-after-free error exists that allows an attacker to crash the application or execute arbitrary code.

- A double-free error exists that allows an attacker to crash the application or possibly execute arbitrary code. (CVE-2015-0312)


Upgrade to Adobe Flash Player version or later.

Alternatively, Adobe has made version available for those installations that cannot be upgraded to 16.x.

See Also





Plugin Details

Severity: High

ID: 80999

File Name: macosx_flash_player_16_0_0_296.nasl

Version: $Revision: 1.17 $

Type: local

Agent: macosx

Published: 2015/01/26

Modified: 2017/06/06

Dependencies: 53914

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:adobe:flash_player

Required KB Items: MacOSX/Flash_Player/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/01/22

Vulnerability Publication Date: 2015/01/21

Exploitable With

Core Impact

Metasploit (Adobe Flash Player ByteArray UncompressViaZlibVariant Use After Free)

Reference Information

CVE: CVE-2015-0311, CVE-2015-0312

BID: 72283, 72343

OSVDB: 117428, 117580