Untrusted search path vulnerability in the (1) "VST plugin with Python scripting" and (2) "VST plugin for writing score generators in Python" in Csound 5.08.2, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
Metrics
Affected Vendors & Products
References
History
Wed, 28 May 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
Thu, 22 May 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |

Status: PUBLISHED
Assigner: mitre
Published: 2009-01-28T11:00:00
Updated: 2024-08-07T11:13:13.931Z
Reserved: 2009-01-27T00:00:00
Link: CVE-2008-5986

No data.

Status : Deferred
Published: 2009-01-28T11:30:00.217
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-5986
