Detecting vulnerabilities in BitTorrent applications allows hackers to control user computers
A serious flaw in the BitTorrent application of Transmission was discovered by Tavis Ormandy, a leading security expert at Google. If successfully exploited, hackers can take full control of computers running Linux or Windows.
The Ormandy said hackers could exploit the vulnerability (CVE-2018-5702) to take full control of the application through the website.
Ormandy published the document to explain how the vulnerability works on Chrome and Firefox browsers on computers with Linux or Windows operating systems. This security expert also warns that if users of other platforms such as macOS enable remote access, it is also likely to be affected by this vulnerability.
Some users use a torrent downloader without a password, so hackers can use the domain recovery method to attack a device and control it remotely.
In addition, hackers can take advantage of the vulnerability to change the torent's downloaded file directory and run any command when the application finishes downloading a file.
According to Ormandy, this is one of the first vulnerabilities that allows remote code execution to affect the popular torrent download program.
Ormandy and his team Google's Project Zero reported to Transmission about this serious vulnerability with a patch on November 30, 2017, but so far the company has not responded. Therefore, the security experts group had to publicly disclose their findings.
Your device is in danger of being attacked if you use Torrents to download files from the internet. Therefore, you need to immediately turn off the remote access feature.
You can visit the following link to find out more details about the vulnerability in the BitTorrent application of Transmission.
To fix this, users need to update the security patch immediately when there is information from the provider as well as turn off the feature to allow remote access. While waiting for an update, users should remove or restrict the use of BitTorrent to download the file.
See more:
- The new vulnerability on Intel allows hackers to take control of your computer within 30 seconds
- It turns out this is how hackers attack your computer through the main screen
- Former NSA hacker turned Kaspersky antivirus software into a spy tool
You should read it
- Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computer
- Security vulnerabilities - basic insights
- The new vulnerability on Intel allows hackers to take control of your computer within 30 seconds
- Detects 'long-standing' security vulnerabilities in Microsoft Office
- Android apps used by the US military in combat have security holes
- The new zero-day vulnerability on Windows 10 helps hackers take control of the computer
- Many serious vulnerabilities have been discovered that allow attackers to take full control of the 4G router
- BitTorrent for beginners: instructions for downloading torrent
May be interested
- Detecting an extremely dangerous vulnerability on nearly 16,000 iOS applicationsapps with high download volume and users of over 100 million people like instagram, amazon, twitter and dropbox are likely to be affected.
- Link download BitTorrent 7.10.5.45785bittorrent 7.10.5.45785 is a tool for downloading and sharing files. it allows users connected to the same name network to download and upload torrents. the software works through peer-to-peer networks.
- Instructions for syncing multiple devices with BitTorrent Syncin addition to downloading torrent files, bittorrent also has a good application that helps to synchronize data between many different devices, namely bittorrent sync. based on the p2p (peer to peer) sharing principle, bittorrent sync allows users to synchronize data between multiple computers and different operating system platforms.
- How to Download Movies Online Using Bittorrentbittorrent is a software program that allows you to download a single file from multiple people at the same time. during the process of downloading files with bittorrent, you are also uploading to others the parts you have downloaded. the more popular a file is, the more people are sharing it, and the faster you'll download it. there are different bittorrent clients to choose from.[1] x research source
- How to use BitTorrent software to download movies and gamesbittorrent is a software that supports downloading torrents on computers, downloading data types such as movies, software, games with fast and efficient download speeds by p2p protocol.
- If you hack HP's printer, you will receive $ 10,000hp is offering a printer-specific vulnerability program, whereby any researcher who discovers vulnerabilities that allow hackers to take control of the company's printer will be rewarded with $ 10,000.
- The unsafe 'feature' on UC Browser allows hackers to take control of Android phones remotelywatch! if you are constantly using uc browser as the main browser on your smartphone, now is the time to carefully consider uninstalling it immediately.
- Hackers can modify Safari on macOS to steal user dataapple was notified of this security flaw six months ago but has not yet patched it.
- Learn about BitTorrentbittorrent is a 'current king' in file sharing, but what is it, and more importantly, how can you use it to download music, video, software and other files?
- Many serious vulnerabilities have been discovered that allow attackers to take full control of the 4G routerin the past few months, security experts around the world have found that many vulnerabilities exist in 4g routers.