Who knew that unzipping a font archive could unleash a malicious file
The researchers were able to construct a simple proof of concept in the form of a shell execution that allowed FontForge to open files to which it shouldn't have access – which is bad.
"The filename comes from the ArchiveParseTOC function, which means we can create an archive containing a malicious filename, bypassing traditional filename sanitization techniques, and triggering our exploit."
We have summarized this news so that you can read it quickly. If you are interested in the news, you can read the full text here. Read more: