CVE-2016-0984
Published on February 10, 2016

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983.

Vendor Advisory NVD

Known Exploited Vulnerability

This Adobe Flash Player and AIR Use-After-Free Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Use-after-free vulnerability in Adobe Flash Player and Adobe AIR allows attackers to execute code.

The following remediation steps are recommended / required by June 15, 2022: The impacted products are end-of-life and should be disconnected if still in use.

Vulnerability Analysis

CVE-2016-0984 is exploitable with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.

What is a Dangling pointer Vulnerability?

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE-2016-0984 has been classified to as a Dangling pointer vulnerability or weakness.


Products Associated with CVE-2016-0984

You can be notified by stack.watch whenever vulnerabilities like CVE-2016-0984 are published in these products:

What versions are vulnerable to CVE-2016-0984?

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.