Page 1 of 7 1234 ... LastLast
Results 1 to 10 of 65

Thread: READ This or You risk ban on all trackers

  1. #1
    Poster BT Rep: +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100BT Rep +100
    Join Date
    Nov 2007
    Posts
    1,339
    Hi all

    This is urgent news for all of those who uses private trackers, especially What.cd/waffles or any of the popular ones

    SWITCH TO UTORRENT 1.7.6
    (if you are using utorrent ofcourse) NOW OR YOU WILL PROBABLY BE BANNED ON EVERY TRACKER

    Whatcd

    The staff at What.cd highly recommend you immediately update to 1.7.6 if you are using the uTorrent client. There is a bug that will allow a user (or agency) to remotely crash your client. The uTorrent team state the flaw affects all older uTorrent versions 1.6 and 1.7.x. too but have been quick to respond, releasing a new build - uTorrent 1.7.6 (build 7859) which has fixed the issue.

    You can read the news story here http://torrentfreak.com/bittorrent-c...attack-080117/

    2008-01-15: Version 1.7.6 (build 7859)
    - Change: do not use adapter subnet to identify local peers
    - Fix: double-clicking to open items in RSS releases tab
    - Fix: remote crash bug (affects all 1.6.x, 1.7.x, and 1.8 builds released to date)
    - Fix: limit local peers if disk is congested

    There are also reports of a s PoC code to EXECUTE code on overflow, so this would allow a remote attacker to run code on your machine.

    Even if they are unable to execute code, the health of our swarms are highly at risk. Anti P2P agencies will quite possibly be running bots to crash clients as soon as they can, which could easily be before you've even read this announcement. A very large percentage of all peers on all trackers are running a vulnerable client and these bots can and will destroy swarms.

    It is very likely we will be banning all vulnerable uTorrent clients, the few users we may lose because of not allowing 1.6.x will secure the survival of the swarm. As it is now if users do not upgrade and we continue to allow the flawed versions a bot run to crash peers on this tracker could easily cut our peers and even our seeded torrents in half. To achieve herd immunity we will likely be forced to make this update mandatory, as I know many of you are stubborn on upgrading past the 1.6 series ( I too was a 1.6.1 user until now).

    You can ofcourse switch to another client altogether, there will be some sites that are slower to allow 1.7.6 but I am fairly sure when I say it will move alot faster than other whitelistings, and it is quite possible many or most sites will even ban previous versions as we will have to do if the majority ignore warning and put our swarms at risk of being DOS'd.

    Update from a BMTV sysop generally the last site to allow new builds

    "I've just added uTorrent 1.7.6 to the allow list after find out about the Static Overflow.
    Vulnerable Systems:
    * BitTorrent version 6.0 build 5535 and prior
    * uTorrent version 1.7.5 build 4602 and prior
    * uTorrent version 1.8-alpha-7834 and prior

    There is already code out there to take over an XP machine running uTorrent 1.6."

    So don't think we are alone in this
    Waffles

    Waffles users using µTorrent must update to 1.7.6 by Jan-20-08. The sooner, the better.
    There is a bug that will potentially allow a user/agency to crash your client. There are rumors that it may be even possible to execute code.

    You can read more on this issue here: http://torrentfreak.com/bittorrent-c...attack-080117/

    "The uTorrent team state the flaw affects all older uTorrent versions 1.6 and 1.7.x. too but have been quick to respond, releasing a new build - uTorrent 1.7.6 (build 7859) which has fixed the issue."

    You may download the updated client here: http://download.utorrent.com/1.7.6/utorrent.exe
    You can also check for updates within the client itself, using Help -> Check for updates

    "So far, the problem appears to affect these clients:

    - BitTorrent 6.0 (build 5535)
    - uTorrent 1.7.5 (build 4602)
    - uTorrent 1.8 (alpha 7834)"

    After January 19th, non-updated clients will be banned.
    According to TorrentFreak:

    uTorrent and Official BitTorrent Client Vulnerable to Remote DOS Attack
    Written by enigmax on January 17, 2008

    Both the official BitTorrent and uTorrent clients are vulnerable to a remote denial-of-service attack, due to the way they handle user-supplied data. Versions found to be vulnerable so far are the official BitTorrent 6.0 client,
    uTorrent 1.7.x, uTorrent 1.6.x and uTorrent 1.8-alpha-7834.

    Security vulnerabilities in BitTorrent clients are relatively rare, although not unheard of. Luigi Auriemma, a Milan-based security expert, claims to have found a vulnerability in various BitTorrent clients based on the way they handle user-supplied data. The flaw allows an attacker to crash the application, effectively denying service to legitimate users. Code execution is not possible, which means there is little reason for users to panic.

    So far, the problem appears to affect these clients:

    - BitTorrent 6.0 (build 5535)
    - uTorrent 1.7.5 (build 4602)
    - uTorrent 1.8 (alpha 7834)

    Luigi is reporting that earlier versions of these clients may also be vulnerable and this appears to have been confirmed by the uTorrent team. The problems are confirmed to exist on Windows versions of the software. As yet, Mac and Linux versions of the official BitTorrent client have not been tested.

    The bug in detail (from Luigi’s site):

    By default both the clients have the “Detailed Info” window active with the “General” section visible in it where are reported various informations about the status of the torrent and the trackers in use.

    In this same window near “General” there is also the “Peers” section which is very useful since it showes many informations about the other connected clients like the percentage of availability of the shared torrent, their IP address, country, speed and amount of downloaded and uploaded data and moreover the version of their client (like “BitTorrent 6.0″, “Azureus 3.0.3.4″, “uTorrent 1.7.5″, “KTorrent 2.2.4″ and so on).

    When this window is visualized by the user the unicode strings with the software versions of the connected clients are copied in the relative static buffers used for the visualization in the GUI through the wcscpy function.

    If this string is too long a crash will occur immediately or in some cases (like on BitTorrent) could happen later or when the user watches the status of another torrent or leaves the “Peers” window. Code execution is not possible.

    For exploiting the problem is enough that an external attacker connects to the random port opened on the client and sends the long client version and the SHA1 hash of the torrent currently in use and watched
    on the target. Note that all these parameters (client IP, port and torrent’s hash) are
    publicly available on the tracker.

    The uTorrent team state the flaw affects all older uTorrent versions 1.6 and 1.7.x. too but have been quick to respond, releasing a new build - uTorrent 1.7.6 (build 7859) which has fixed the issue.

    Make your switch to uTorrent 1.7.6


    http://www.utorrent.com/download.php

    For Change logs
    http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt

    Take care and switch..all other trackers will be notified as well shortly.

  2. BitTorrent   -   #2
    Poster BT Rep: +7BT Rep +7
    Join Date
    Mar 2007
    Location
    Australia
    Posts
    60
    thanks for the heads up. updating now
    looking for TT

  3. BitTorrent   -   #3
    Artemis's Avatar ¿ןɐɯɹou ǝq ʎɥʍ BT Rep: +3
    Join Date
    Jun 2007
    Location
    127.0.0.1
    Posts
    5,472
    From the waffles homepage warning on this:

    "So far, the problem appears to affect these clients:

    - BitTorrent 6.0 (build 5535)
    - uTorrent 1.7.5 (build 4602)
    - uTorrent 1.8 (alpha 7834)"

    After February 1st, non-updated clients will be banned, EXCEPT for the 1.6 series.

    so apart from What everyone else supports 1.6.1 and as yet even the utorrent team has not tested whether 1.6.1 suffers from the buffer overflow error.

    4d7920686f76657263726166742069732066756c6c206f662065656c73


  4. BitTorrent   -   #4
    Zaxx's Avatar Ol' Skool P2P BT Rep: +3
    Join Date
    Dec 2007
    Location
    In The Space Between...
    Posts
    583
    "It's not what ya got, it's what you give."
    Please do not PM me for invites. Thx.


  5. BitTorrent   -   #5
    Sharing since 2002 BT Rep: +18BT Rep +18BT Rep +18BT Rep +18
    Join Date
    Nov 2006
    Posts
    1,339
    Updated to 1.7.6, thanks for the info.

  6. BitTorrent   -   #6
    VIZFX's Avatar Looking at You! BT Rep: +2
    Join Date
    Nov 2007
    Posts
    349
    Very good info. I'm a utorrent user as well so thanks.

  7. BitTorrent   -   #7
    pandabear's Avatar Internet BT Rep: +2
    Join Date
    Nov 2006
    Posts
    556
    You don't risk ban persay, your client risks ban, making it impossible to use the announce. This thread seems to be a lot more urgent than it needs to be.


    Someone invite me to fsc please

  8. BitTorrent   -   #8
    game1283's Avatar "ǝuo ǝɥʇ" BT Rep: +7BT Rep +7
    Join Date
    May 2007
    Location
    I live in my own world!
    Posts
    725
    Many THANKS!!


  9. BitTorrent   -   #9
    Quote Originally Posted by Artemis View Post
    so apart from What everyone else supports 1.6.1 and as yet even the utorrent team has not tested whether 1.6.1 suffers from the buffer overflow error.
    hdbits going to ban any precedent version too

    uTorrent 1.7.6 is out, get downloading it Fixes a vulnerability with all other versions of utorrent that potentially allowed someone to crash your utorrent.
    All other versions (except 1.8b) will be banned in a few days, to keep you all up to date (why use out of date software?)
    PS: if you still didn't get it: ANY precedent version is vulnerable.

  10. BitTorrent   -   #10
    sleepyy's Avatar Old-Fashioned BT Rep: +10BT Rep +10
    Join Date
    Oct 2007
    Posts
    969
    I'm not going to use two different clients for the sake of one site if the majority of the torrent sites force me to upgrade i will just switch to azures i know the issue of the 1.6 utorrent has not been proved so i keep hearing since the the release of utorrent 1.6 i have never had any problems and i have never been targeted or had problems so i will stick with what i am used to i have nothing on my machine anyhow worth anything to anybody everything that is worthy is encrypted and stuck on a usb stick and is put where the sun don't shine
    Last edited by sleepyy; 01-18-2008 at 10:59 AM.

Page 1 of 7 1234 ... LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •