CVE-2020-17448

EUVD-2020-9400
Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 44%
Affected Products (NVD)
VendorProductVersion
telegramtelegram_desktop
𝑥
≤ 2.1.13
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
telegram-desktop
bookworm
4.6.5+ds-2
fixed
bullseye
3.1.1+ds-1~deb11u2
fixed
buster
no-dsa
sid
4.14.9+ds-1.1
fixed
trixie
4.14.9+ds-1.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
telegram-desktop
bionic
needs-triage
focal
needs-triage
groovy
not-affected
hirsute
not-affected
impish
not-affected
jammy
not-affected
kinetic
not-affected
lunar
dne
mantic
dne
noble
dne
trusty
dne
xenial
dne