Multiple untrusted search path vulnerabilities in IsoBuster 2.8 allow local users to gain privileges via a Trojan horse (1) wnaspi32.dll or (2) ntaspi32.dll file in the current working directory, as demonstrated by a directory that contains a .img file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2012-09-07T10:00:00Z

Updated: 2024-09-16T18:02:51.436Z

Reserved: 2012-09-07T00:00:00Z

Link: CVE-2010-5259

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-09-07T10:32:22.743

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-5259

cve-icon Redhat

No data.