#VU10469 Spoofing attack in Telegram Desktop for Windows
Published: February 13, 2018
Telegram Desktop for Windows
Telegram
Description
The vulnerability exists due to improper parsing of right-to-left override (RLO) character when processing names of the transmitted files in Telegram Desktop for Windows. A remote attacker can create a specially crafted filename with malicious content (e.g. a JavaScript file), disguise it as an image and trick the victim into opening it.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note: this vulnerability has been exploited in the wild since March until October in 2017, according to Kaspersky Lab and was silently fixed by the vendor.
Remediation
It is unclear, in which version this vulnerability was fixed, however according to Kaspersky Lab statement and commits to the official GitHub repository, version 1.1.23 should be vulnerable to this issue.