• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Data Strategy Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users' PCs

Tavis Ormandy claims that Transmission developers ignored Google Project Zero security warnings

Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users' PCs
  • Nicholas Fearn
  • Nicholas Fearn
  • 16 January 2018
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

Google Project Zero security researchers have found what they claim is a "critical flaw" in the Transmission BitTorrent client that could enable cyber crooks to take control of users' computers.

According to Project Zero, the client is vulnerable to a DNS re-binding attack that effectively tricks the PC into accepting requests via port 9091 from malicious websites that it would (and should) ordinarly ignore. 

The flaw could enable attackers to execute all kinds of attacks, including remote code execution, and works in both Chrome and Firefox - other browsers will almost certainly be vulnerable too. 

Google Project Zero researcher Tavis Ormandy published proof of concept attack code last week in order to demonstrate the severity of the security flaw and to force the developers of Transmission to rush out a patch. He described it as a "relatively low complexity exploit", making it easy for attackers to deploy. 

But Ormandy claims that the open-source developers responsible for maintaining Transmission haven't been quick to respond to his communications.

While the flaw was uncovered in November, they claimed that it would not be possible to produce a patch for weeks - possibly even busting Project Zero's unilateral 90-day disclosure rule. That would be a first for an open-source project, Ormandy claimed. 

Writing on Twitter, Ormandy warned that it was not the only BitTorrent application vulnerable to the DNS-rebinding flaw. Rather, it is the "first of a few remote code execution flaws in various popular torrent clients".

First of a few remote code execution flaws in various popular torrent clients, here is a DNS rebinding vulnerability Transmission, resulting in arbitrary remote code execution. https://t.co/kAv9eWfXlG

— Tavis Ormandy (@taviso) January 11, 2018

Publicising details of the attack appears to have done the trick of forcing the developers to rush out a patch, but this has not been applied in all the software that uses the Transmission protocol, Ormandy warned. 

In a follow up to his original November post warning of a security vulnerability, Ormandy last week wrote: "I'm finding it frustrating that the Transmission developers are not responding on their private security list, I suggested moving this into the open so that distributions can apply the patch independently. I suspect they won't reply, but let's see.

"I've never had an open-source project take this long to fix a vulnerability before, so I usually don't even mention the 90-day limit if the vulnerability is in an open source project.

"I would say the average response time is measured in hours rather months if we're talking about open source."

Transmission is one of a number of BitTorrent peer-to-peer file sharing clients.

Rather than a centralised hub-and-spoke system for distributing files and data, shared files are decentralised, but publicised via the software that utilises the protocol. If anyone in the network wants a file, it is downloaded in 'pieces' from the source or sources. 

Peer-to-peer file sharing, however, has gained a reputation as a distribution mechanism for pirated software, television shows and films.

However, the protocol is also used for many legitimate file-distribution purposes, such as software and other downloads by legitimate vendors in order to reduce the stresses on networks that more centralised distribution systems can cause. 

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Google
  • security
  • Project Zero
  • Tavis Ormandy
  • Transmission
  • BitTorrent

V3 Latest

First plant to grow on the Moon, err, dies
First plant to grow on the Moon, err, dies

Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night

  • Communications
  • 18 January 2019
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData

Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018

  • Software
  • 18 January 2019
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand

Meteor showers as a service will be visible for about 100 kilometres in all directions

  • Communications
  • 18 January 2019
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data

New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago

  • Communications
  • 18 January 2019
Back to Top
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017