๐Ÿ” CVE Alert

CVE-2009-20004

UNKNOWN 0.0

gAlan <= 0.2.1 Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

gAlan 0.2.1, a modular audio processing environment for Windows, is vulnerable to a stack-based buffer overflow when parsing .galan files. The application fails to properly validate the length of input data, allowing a specially crafted file to overwrite the stack and execute arbitrary code. Exploitation requires local interaction, typically by convincing a user to open the malicious file.

CWE CWE-121
Vendor galan
Product galan
Published Aug 21, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for galan galan

Be the first to know when new unknown vulnerabilities affecting galan galan are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

gAlan / gAlan
* โ‰ค 0.2.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/galan_fileformat_bof.rb exploit-db.com: https://www.exploit-db.com/exploits/16664 exploit-db.com: https://www.exploit-db.com/exploits/10345 exploit-db.com: https://www.exploit-db.com/exploits/10339 fortiguard.com: https://www.fortiguard.com/encyclopedia/ips/18034/galan-galan-file-stack-overflow web.archive.org: https://web.archive.org/web/20101210055252/http://galan.sourceforge.net/ vulncheck.com: https://www.vulncheck.com/advisories/galan-buffer-overflow

Credits

Jeremy Brown