Untrusted search path vulnerability in Microsoft Visual Studio 2008 SP1, 2010, and 2010 SP1 allows local users to gain privileges via a Trojan horse add-in in an unspecified directory, aka "Visual Studio Add-In Vulnerability." Per: http://technet.microsoft.com/en-us/security/bulletin/ms12-021
'An attacker could then place a specially crafted add-in in the path used by Visual Studio. When Visual Studio is started by an administrator, the specially crafted add-in would be loaded with the same privileges as the administrator.'
'The vulnerability could not be exploited remotely or by anonymous users.' Per: http://cwe.mitre.org/data/definitions/426.html
'CWE-426: Untrusted Search Path'
Publication date: Wed, 14 Mar 2012 02:55:00 +0000