speedguide.net  

Port 4868 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
4868 tcp applications Stack-based buffer overflow in the bpe_decompress function in (1) BlackBerry QNX Neutrino RTOS through 6.5.0 SP1 and (2) QNX Momentics Tool Suite through 6.5.0 SP1 in the QNX Software Development Platform allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted packets to TCP port 4868.
References: [CVE-2013-2687]
SG
4868 udp applications Multiple QNX products is vulnerable to a buffer overflow, caused by improper bounds checking by copying the large input buffer to a small output buffer when handling the device file. By sending a specially-crafted request to UDP port 4868, a remote attacker could exploit this vulnerability to overflow a buffer and execute arbitrary code on the system or cause the application to crash.
References: [CVE-2013-2688] [XFDB-85524] [BID-61023]
SG
4868 tcp,udp phrelay Photon Relay IANA
3 records found
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About