speedguide.net  

Port 99 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
99 udp metagram Metagram Relay, gnutella

Seapine Software TestTrack server allows a remote attacker to cause a denial of service (high CPU) via (1) TestTrackWeb.exe and (2) ttcgi.exe by connecting to port 99 and disconnecting without sending any data.
References: [CVE-1999-1567]
SG
99 tcp trojans Hidden Port, Mandragore, NCX trojans

Backdoor.Win32.Ncx.b / Remote Stack Buffer Overflow - the malware listens on TCP port 99. Third-party attackers who can reach an infected system can send a large junk payload and trigger a classic stack buffer overflow overwriting the EIP, ECX registers and structured exception handler (SEH).
References: [MVID-2021-0388]

Backdoor.Win32.Ncx.b / Unauthenticated Remote Command Execution - the malware listens on TCP port 99. Third-party attackers who can reach an infected system can execute OS commands further compromising the host.
References: [MVID-2021-0389]
SG
99 tcp HiddenPort [trojan] Hidden Port SANS
99 tcp Hidden [trojan] Hidden SANS
99 tcp Mandragore [trojan] Mandragore SANS
99 tcp NCX [trojan] NCX SANS
99 tcp,udp metagram Metagram Relay IANA
7 records found

Related ports: 90  

News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About