The host is installed with Audacity through 2.3.3 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle the temporary directory permissions. Successful exploitation could allow any user on the system to read and play the temporary audio .au files located there.