{ "schema_version": "1.4.0", "id": "GHSA-p2fh-pcwg-6jc4", "modified": "2022-05-01T02:17:13Z", "published": "2022-05-01T02:17:13Z", "aliases": [ "CVE-2005-3371" ], "details": "Multiple interpretation error in AVG 7 7.0.323 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an \"MZ\" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a \"triple headed\" program that contains EXE, EML, and HTML content, aka the \"magic byte bug.\"", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3371" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=113026417802703&w=2" }, { "type": "WEB", "url": "http://www.securityelf.org/magicbyte.html" }, { "type": "WEB", "url": "http://www.securityelf.org/magicbyteadv.html" }, { "type": "WEB", "url": "http://www.securityelf.org/updmagic.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/15189" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-10-30T14:34:00Z" } }