Port 99 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
99 |
udp |
metagram |
Metagram Relay, gnutella
Seapine Software TestTrack server allows a remote attacker to cause a denial of service (high CPU) via (1) TestTrackWeb.exe and (2) ttcgi.exe by connecting to port 99 and disconnecting without sending any data.
References: [CVE-1999-1567] |
SG
|
99 |
tcp |
trojans |
Hidden Port, Mandragore, NCX trojans
Backdoor.Win32.Ncx.b / Remote Stack Buffer Overflow - the malware listens on TCP port 99. Third-party attackers who can reach an infected system can send a large junk payload and trigger a classic stack buffer overflow overwriting the EIP, ECX registers and structured exception handler (SEH).
References: [MVID-2021-0388]
Backdoor.Win32.Ncx.b / Unauthenticated Remote Command Execution - the malware listens on TCP port 99. Third-party attackers who can reach an infected system can execute OS commands further compromising the host.
References: [MVID-2021-0389] |
SG
|
99 |
tcp |
HiddenPort |
[trojan] Hidden Port |
SANS
|
99 |
tcp |
Hidden |
[trojan] Hidden |
SANS
|
99 |
tcp |
Mandragore |
[trojan] Mandragore |
SANS
|
99 |
tcp |
NCX |
[trojan] NCX |
SANS
|
99 |
tcp,udp |
metagram |
Metagram Relay |
IANA
|
|
7 records found
Related ports: 90
|