Bittorrent : Security Vulnerabilities

The bencoding parser in BitTorrent uTorrent through 3.5.5 (build 45505) misparses nested bencoded dictionaries, which allows a remote attacker to cause a denial of service.
Max Base Score
7.5
Published 2020-03-02
Updated 2022-05-03
EPSS 0.87%
A vulnerability, which was classified as critical, has been found in uTorrent. This issue affects some unknown processing of the component Guest Account. The manipulation leads to privilege escalation. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
Max Base Score
8.8
Published 2022-06-17
Updated 2022-06-29
EPSS 0.36%
A vulnerability classified as critical was found in uTorrent. This vulnerability affects unknown code of the component PRNG. The manipulation leads to weak authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
Max Base Score
8.8
Published 2022-06-17
Updated 2022-06-29
EPSS 0.72%
A vulnerability classified as critical has been found in uTorrent. This affects an unknown part. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to upgrade the affected component.
Max Base Score
8.8
Published 2022-06-17
Updated 2022-06-29
EPSS 0.39%
The lazy_bdecode function in BitTorrent DHT bootstrap server (bootstrap-dht ) allows remote attackers to execute arbitrary code via a crafted packet, related to "improper indexing."
Max Base Score
7.5
Published 2015-08-13
Updated 2015-08-13
EPSS 32.22%
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
Max Base Score
9.3
Published 2015-08-13
Updated 2015-08-13
EPSS 3.46%
BitTorrent Sync allows remote attackers to execute arbitrary commands via a crafted btsync: link.
Max Base Score
9.3
Published 2015-04-13
Updated 2016-12-03
EPSS 53.87%
The web interface in BitTorrent allows remote attackers to execute arbitrary commands by leveraging knowledge of the pairing values and a crafted request to port 10000.
Max Base Score
6.8
Published 2014-12-12
Updated 2014-12-16
EPSS 29.52%
The lazy_bdecode function in BitTorrent bootstrap-dht (aka Bootstrap) allows remote attackers to execute arbitrary code via a crafted packet, which triggers an out-of-bounds read, related to "Improper Indexing."
Max Base Score
7.5
Published 2014-10-31
Updated 2014-11-03
EPSS 25.14%
Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header. NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364.
Max Base Score
5.0
Published 2009-09-04
Updated 2009-09-09
EPSS 3.86%
Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and earlier and (2) BitTorrent 6.0.3 build 8642 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a .torrent file.
Max Base Score
9.3
Published 2008-10-03
Updated 2017-08-08
EPSS 12.09%
Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier.
Max Base Score
5.0
Published 2008-01-18
Updated 2018-10-15
EPSS 6.20%
The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header.
Max Base Score
4.3
Published 2008-06-16
Updated 2018-10-15
EPSS 3.94%
13 vulnerabilities found
This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!