source: https://www.securityfocus.com/bid/17153/info
Reportedly, an attacker can carry out directory-traversal attacks. These issues present themselves when the application processes malformed archives.
A successful attack can allow the attacker to place potentially malicious files and overwrite files on a computer in the context of the user running the affected application. A successful exploit may aid in further attacks.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27450.zip