Saturday, September 21, 2019
Home program hacking knowledge uTorrent Exploit Can Leave PCs Vulnerable To Hacking Exploits –

uTorrent Exploit Can Leave PCs Vulnerable To Hacking Exploits –


Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

- utorrent pc - uTorrent Exploit Can Leave PCs Vulnerable To Hacking Exploits –

Credits: ABC News

An exploit in the P2P program BitTorrent, uTorrent and uTorrent Web could effectively allow to remotely hijack a user’s PC via DNS rebinding. Allowing them to install remote code and execute malware.

Google researcher Tavis Ormandy revealed the vulnerability over Twitter, and provided a detailed list of the exploits in the Windows version of the program. Mercifully, however, Ormandy’s had already began fixing these bugs himself.

BitTorrent engineering vice president, Dave Rees, has since released a statement, saying that the flaws in the (conventional) client had been fixed in earlier beta version last week.

“On 4 December 2017, we were made aware of several vulnerabilities in the uTorrent and BitTorrent Windows desktop clients. We began work immediately to address the issue. Our fix is complete and is available in the most recent beta release (build released on 16 Feb 2018). This week, we will begin to deliver it to our installed base of users. All users will be updated with the fix automatically over the following days. The nature of the exploit is such that an attacker could craft a URL that would cause actions to trigger in the client without the user’s consent (e.g. adding a torrent).”

He also added that a patch for the uTorrent Web exploit is now in place, and should more or less resolve the issue.

“The team behind uTorrent Web released a patch for that issue yesterday and we highly encourage all uTorrent Web customers to update to the latest available build available on our website and also via the in- update notification.”

- logo16 - uTorrent Exploit Can Leave PCs Vulnerable To Hacking Exploits –

Sadik Shaikh | Cyber Suraksha Abhiyan, Ethical Hacking Training Institute, CEHv9,CHFI,ECSAv9,CAST,ENSA, CCNA, CCNA SECURITY,MCITP,RHCE,CHECKPOINT, ASA FIREWALL,VMWARE,CLOUD,ANDROID,IPHONE,NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v9 course in Pune-India, ceh certification in pune-India, ceh v9 training in Pune-India, Ethical Hacking Course in Pune-India


Source link


Please enter your comment!
Please enter your name here