Description
gAlan 0.2.1, a modular audio processing environment for Windows, is vulnerable to a stack-based buffer overflow when parsing .galan files. The application fails to properly validate the length of input data, allowing a specially crafted file to overwrite the stack and execute arbitrary code. Exploitation requires local interaction, typically by convincing a user to open the malicious file.
Problem types
CWE-121 Stack-based Buffer Overflow
Product status
*
Credits
Jeremy Brown
References
raw.githubusercontent.com/...eformat/galan_fileformat_bof.rb
www.exploit-db.com/exploits/16664
www.exploit-db.com/exploits/10345
www.exploit-db.com/exploits/10339
www.fortiguard.com/.../18034/galan-galan-file-stack-overflow
web.archive.org/...01210055252/http://galan.sourceforge.net/
www.vulncheck.com/advisories/galan-buffer-overflow