Untrusted search path vulnerability in the (1) "VST plugin with Python scripting" and (2) "VST plugin for writing score generators in Python" in Csound 5.08.2, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2009-01-28T11:00:00

Updated: 2017-08-07T12:57:01

Reserved: 2009-01-27T00:00:00


Link: CVE-2008-5986

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2009-01-28T11:30:00.217

Modified: 2017-08-08T01:33:39.640


Link: CVE-2008-5986

JSON object: View

cve-icon Redhat Information

No data.