Mini-stream Ripper is vulnerable to a buffer overflow when parsing malicious .PLS files, which can result in arbitrary code execution.
Mini-stream Ripper 220.127.116.11
Remote Code Execution
Exploitation of this vulnerability is possible by sending maliciously crafted documents, via phishing emails, to vulnerable users. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.
BeyondTrust Prevention and Detection:
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
- 31958 - Mini Stream Ripper Buffer Overflow (Zero-Day)
- 31959 - Mini Stream Ripper Buffer Overflow (Zero-Day) - x64
No mitigation currently exists.