Echo Mirage 3.1 contains a stack buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized string in the Rules action field. Attackers can create a malicious text file with a crafted payload exceeding buffer boundaries and paste it into the action field through the Rules dialog to trigger the overflow and overwrite the return address.
| Vendor | Product | Versions |
|---|---|---|
| sourceforge | echo mirage | 3.1 |
Updated severity to CRITICAL and marked exploit as available and actively exploited.
Initial creation