Developers are in the process of releasing updates to fix the critical flaws.
Two versions of uTorrent, one of the Internet’s most widely used BitTorrent apps, have easy-to-exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories, a Google Project Zero researcher said. uTorrent developers are in the process of rolling out fixes for both the uTorrent desktop app for Windows and the newer uTorrent Web product.
The vulnerabilities, according to Project Zero, make it possible for any website a user visits to control key functions in both the uTorrent desktop app for Windows and in uTorrent Web, an alternative to desktop BitTorrent apps that uses a Web interface and is controlled by a browser. The biggest threat is posed by malicious sites that could exploit the flaw to download malicious code into the Windows startup folder, where it will be automatically run the next time the computer boots up. Any site a user visits can also access downloaded files and browse download histories.
In an e-mail sent late Tuesday afternoon, Dave Rees, VP of engineering at BitTorrent, which is the developer of the uTorrent apps, said the flaw has been fixed in a beta release of the uTorrent Windows desktop app but has not yet been delivered to users who already have the production version of the app installed. The fixed version, uTorrent/BitTorrent 22.214.171.124352, is available here for download and will be automatically pushed out to users in the coming days. In a separate e-mail sent Tuesday evening, Rees said uTorrent Web had also been patched. “We highly encourage all uTorrent Web customers to update to the latest available build 0.12.0.502 available on our website and also via the in-application update notification,” he wrote.
Earlier Tuesday, Project Zero researcher Tavis Ormandy warned that the flaws remained unfixed in uTorrent Web. Rees’ later email indicated that’s no longer the case.
Working as a cyber security solutions architect, Alisa focuses on bug bounty and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.