![]() The nature of the exploit is such that an attacker could craft a URL that would cause actions to trigger in the client without the user's consent (e.g. All users will be updated with the fix automatically over the following days. This week, we will begin to deliver it to our installed base of users. Our fix is complete and is available in the most recent beta release (build 3.2 released on ). We began work immediately to address the issue. ![]() "On December 4, 2017, we were made aware of several vulnerabilities in the uTorrent and BitTorrent Windows desktop clients. Google researcher found a technique that allows attackers to direct DNS requests to user's computer, allowing to spoof the download sources, download files, add them to startup folder and more.Īll versions of uTorrent and BitTorrent are affected and bug is only fixed in latest beta.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |