source: https://www.securityfocus.com/bid/17153/info

Reportedly, an attacker can carry out directory-traversal attacks. These issues present themselves when the application processes malformed archives. 

A successful attack can allow the attacker to place potentially malicious files and overwrite files on a computer in the context of the user running the affected application. A successful exploit may aid in further attacks.

https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27450.zip