Untrusted search path vulnerability in the (1) "VST plugin with Python scripting" and (2) "VST plugin for writing score generators in Python" in Csound 5.08.2, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2009-01-28T11:00:00
Updated: 2017-08-07T12:57:01
Reserved: 2009-01-27T00:00:00
Link: CVE-2008-5986
JSON object: View
NVD Information
Status : Modified
Published: 2009-01-28T11:30:00.217
Modified: 2017-08-08T01:33:39.640
Link: CVE-2008-5986
JSON object: View
Redhat Information
No data.
CWE