Popular BitTorrent Client Lets Hackers Control Your PC Remotely

in #hacking7 years ago (edited)

A crucial vulnerability has been uncovered in the widely used Transmission BitTorrent software which could allow hackers to remotely implement harmful code on BitTorrent users' computer systems and manage them.

The vulnerability has been uncovered by Google's Task Zero vulnerability reporting team, and one of its analysts Tavis Ormandy has also submitted a proof-of-concept attack--just 40 days after the first report.

Usually, Project Zero team discloses vulnerabilities either after 3 months of reporting them to the affected suppliers or until the merchant has released a patch.

However, in this case, the Project Zero researchers disclosed the vulnerability 50 times before the actual time period limit because Transmission designers failed to apply a ready-made patch provided by the experts over per month ago.

"I'm finding it aggravating that the
transmission developers are not responding. on the private security list, I recommended moving this in to the open up so that
distributions can apply the patch individually. I suspect they don't reply, but let's see," Ormandy said in a general public report published Wednesday.

Here's The way the Attack Works:

The loophole resides in the fact that services installed on localhost can be manipulated to connect to third-party websites.

"I regularly come across users who do not accept that websites can access services on localhost or their intranet," Ormandy had written in another post, which includes the patch.

"These users recognize that services bound to localhost are just accessible to software jogging on the neighborhood machine and that their web browser is jogging on the neighborhood machine--but somehow believe accessing a site "transfers" execution someplace else. It generally does not work like this, but this is a common way to obtain confusion."

Attackers can exploit this loophole simply by building a DNS name they're approved to communicate with and then rendering it fix to the prone computer's localhost name. Here's the way the attack works:

  1. A user visits destructive site (http://attacker.com), which includes an iframe to a subdomain manipulated by the attacker.

  2. The attacker configures their DNS server to act in response alternately with 127.0.0.1 and 123.123.123.123 (an address manipulated by the attacker) with a very low TTL.

  3. When the browser resolves to 123.123.123.123, it provides HTML that waits for the DNS entry to expire (or power it to terminate by flooding the cache with lookups), then it has permission to read and establish headers.

Ormandy said the vulnerability (CVE-2018-5702) was the "first of a few remote control code execution defects in various popular torrent clients," though he didn't name the other torrent programs due to the 90-day disclosure timeline.

A fix is expected to be released at the earliest opportunity, a development public with Transmission advised ArsTechnica, without specifying an actual date.


I am a newbie in Steemit if you found any mistake then please let me know. If you Like this post then support me by Upvoting this post and also resteem this post so that more people know about this vulnerability which can give there personal information, videos , photos into hackers hand


# Thanks for giving me your valuable Time.


Sort:  

Coin Marketplace

STEEM 0.18
TRX 0.16
JST 0.029
BTC 60883.28
ETH 2401.75
USDT 1.00
SBD 2.63