Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2009-5124 | gAlan 0.2.1, a modular audio processing environment for Windows, is vulnerable to a stack-based buffer overflow when parsing .galan files. The application fails to properly validate the length of input data, allowing a specially crafted file to overwrite the stack and execute arbitrary code. Exploitation requires local interaction, typically by convincing a user to open the malicious file. |
Sat, 23 Aug 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Galan
Galan galan Microsoft Microsoft windows |
|
| Vendors & Products |
Galan
Galan galan Microsoft Microsoft windows |
Fri, 22 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 21 Aug 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | gAlan 0.2.1, a modular audio processing environment for Windows, is vulnerable to a stack-based buffer overflow when parsing .galan files. The application fails to properly validate the length of input data, allowing a specially crafted file to overwrite the stack and execute arbitrary code. Exploitation requires local interaction, typically by convincing a user to open the malicious file. | |
| Title | gAlan <= 0.2.1 Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T11:13:14.317Z
Reserved: 2025-08-21T16:26:55.213Z
Link: CVE-2009-20004
Updated: 2025-08-22T15:27:43.434Z
Status : Deferred
Published: 2025-08-21T21:15:33.087
Modified: 2026-04-15T00:35:42.020
Link: CVE-2009-20004
No data.
OpenCVE Enrichment
Updated: 2025-08-23T10:55:36Z
EUVD