Usually the security team at Google, the “project zero” Project Zero, to detect a new vulnerability after his contribution in finding the gaps in Intel processors, this time in the software company BitTorrent and specifically the programme Transmission.
Proved “Tufts and” Tavis Ormandy, one of the researchers at Google, the presence of gaps in evidence, through manipulation of the servers of the domain to fool the program and get the powers to execute orders remotely, any injury and penetrate the remote device.
There are gaps in the tool that allows management software company BitTorrent from the browser, the user thinks they only work on the device and cannot be accessed from another device. However, “and” reviewing how employees can malicious add part inside the page to select the server to translate domain within the device to move the malware to start everything.
Issued a security team to close those gaps in most programmes, the company said, however, team work BitTorrent does not have the adoption of their promising application as soon as possible, so in the official statement to ArsTechnica.
First of a few remote code execution flaws in various popular torrent clients, here is a DNS rebinding vulnerability Transmission, resulting in arbitrary remote code execution. https://t.co/kAv9eWfXlG
— Tavis Ormandy (@taviso) January 11, 2018
The loophole in the software BitTorrent allows to penetrate the user’s PC and control it remotely appeared first on tech world.