

Utorrent desktop software#
Desktop Central, our desktop management solution, comes with software prohibition features which allow you to block particular applications. By blacklisting software that isn’t necessary for your business, you can minimize your organization’s exposure to critical security vulnerabilities.Ĭlearly define which applications can be installed inside your network by blacklisting and whitelisting software.
Utorrent desktop utorrent#
Vulnerabilities to third-party applications like uTorrent are a good reminder to reevaluate your enterprise’s list of approved software. Fine-tune your enterprise’s approved software list to minimize attack vectors Since this vulnerability was disclosed, uTorrent has released the following patches to address this security issue: Ormandy explained this process in detail in his proof of concept. For example, an attacker can create a malicious website and give it the same DNS name as the local IP address of the computer running uTorrent. With a DNS rebinding attack, attackers inject malicious code on a user’s computer when that user interacts with an anonymous website. This latest vulnerability in uTorrent can be exploited using a hacking method called DNS rebinding. These ports help users access these apps over any browser, but these RPC servers can allow attackers to remotely take control of the torrent application with minimal user input. UTorrent uses ports 1005 to host the HTTP RPC Server.


uTorrent vulnerability: Possible exploits He disclosed the vulnerability to BitTorrent Inc. Tavis Ormandy, a Google Project Zero researcher, found remote code execution vulnerabilities in the Windows desktop version of uTorrent, as well as the web version of uTorrent, back in December 2017. A crucial vulnerability in popular downloading software uTorrent is one of the latest cybersecurity stories. Security vulnerabilities have become headline news, and not just in the IT world.
