[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20080125204250.1fdd7e16.aluigi@autistici.org>
Date: Fri, 25 Jan 2008 20:42:50 +0100
From: Luigi Auriemma <aluigi@...istici.org>
To: bugtraq@...urityfocus.com, bugs@...uritytracker.com,
news@...uriteam.com, full-disclosure@...ts.grok.org.uk
Subject: Re: Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5
Secunia has made additional research on the vulnerability I reported a
week ago about the buffer-overflow in uTorrent and has found that remote
code execution is possible.
That's important moreover because in the moment I'm writing there are
still tons of people which use the 1.7.5 or other vulnerables 1.7.x
versions of uTorrent.
Then some days ago has been released BitTorrent 6.0.1 which fixes the
vulnerability in this client too.
---
Luigi Auriemma
http://aluigi.org
Powered by blists - more mailing lists