|
Port 1234 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1234 |
tcp |
trojans |
Backdoor.Ultor [Symantec-2002-061316-4604-99] (2002.06.13) - remote access trojan. Affects Windows, listens on port 1111 or 1234.
Some other trojans using this port: SubSeven 2.0, Bagle.AF.
Port is also IANA registered for: Infoseek Search Agent |
SG
|
1234 |
udp |
games |
Command and Conquer Renegade
VLC media player default port for UDP/RTP stream.
The xdrDecodeString function in XNFS.NLM in Novell Netware 6.5 before SP8 allows remote attackers to cause a denial of service (abend) or execute arbitrary code via a crafted, signed value in a NFS RPC request to port UDP 1234, leading to a stack-based buffer overflow.
References: [CVE-2010-4227], [BID-46535]
Green Dam could allow a remote attacker to bypass security restrictions, caused by an error when handling UDP packets. By sending a specially-crafted request to UDP port 1234, an attacker could exploit this vulnerability to set the system time.
References: [XFDB-51513], [BID-35557], [OSVDB-55533], [SECUNIA-35664]
Janitza UMG 508, 509, 511, 604, and 605 devices allow remote attackers to obtain sensitive network-connection information via a request to UDP port (1) 1234 or (2) 1235.
References: [CVE-2015-3969], [XFDB-108584] |
SG
|
1234 |
udp |
|
VLC media player Default port for UDP/RTP stream (unofficial) |
Wikipedia
|
1234 |
tcp |
trojan |
KiLo, Ultors Trojan |
Trojans
|
1234 |
tcp |
hotline |
|
SANS
|
1234 |
tcp |
SubSevenJavaclient |
[trojan] SubSeven Java client |
SANS
|
1234 |
tcp |
UltorsTrojan |
[trojan] Ultors Trojan |
SANS
|
1234-1237,4000,5400,5009 |
udp |
applications |
Command and Conquer Red Alert |
Portforward
|
1234-1237 |
udp |
applications |
Command and Conquer Red Alert 2 |
Portforward
|
1234-1237 |
udp |
applications |
Command and Conquer Red Alert 2 Yuris Revenge |
Portforward
|
1234-1237,5009 |
udp |
applications |
Command and Conquer Red Alert Aftermath |
Portforward
|
1234-1237,5009 |
udp |
applications |
Command and Conquer Red Alert Counterstrike |
Portforward
|
1234-1237 |
udp |
applications |
Command and Conquer Renegade |
Portforward
|
1234-1237 |
udp |
applications |
Command and Conquer The Covert Operations |
Portforward
|
1234-1237,5009 |
udp |
applications |
Command and Conquer Tiberian Dawn |
Portforward
|
1234-1237,4000,5400 |
udp |
applications |
Command and Conquer Tiberian Sun |
Portforward
|
1234-1237,4000,5400 |
udp |
applications |
Command and Conquer Tiberian Sun Firestorm |
Portforward
|
1140-1234,4000 |
tcp,udp |
applications |
Dune 2000 |
Portforward
|
1234-1237 |
udp |
applications |
Dune2000 |
Portforward
|
1234-1237 |
udp |
applications |
Emperor Battle for Dune |
Portforward
|
1234-1237 |
udp |
applications |
Nox |
Portforward
|
1234, 3658-3660, 6500, 27900, 28910, 3783, 6515, 6667, 13139, 28900, 29900-29901, 29920 |
tcp,udp |
applications |
Starwars Empire at War |
Portforward
|
1140-1234,4000 |
tcp,udp |
applications |
Tiberian Sun |
Portforward
|
1140,1234 |
udp |
applications |
Westwood Online |
Portforward
|
1140,1234,4000 |
tcp |
applications |
Westwood Online |
Portforward
|
1234-1237,4000,5009,5400 |
udp |
applications |
Xwis |
Portforward
|
1234 |
tcp |
hotline |
hotline |
Nmap
|
1234 |
tcp |
threat |
W32.Beagle |
Bekkoame
|
1234 |
tcp,udp |
threat |
The bindshell.c program puts a backdoor root shell on this port by default. This assumes that you've already been compromised by some other exploit and that the hacker uses the default port. |
Bekkoame
|
1234 |
tcp,udp |
search-agent |
Infoseek Search Agent |
IANA
|
|
30 records found
Related ports: 21 1235 1236 1237 1239
|