speedguide.net  

Port 1250 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
1250 tcp worms W32.Explet.A@mm [Symantec-2004-060219-4511-99] (2004.06.02) - a mass-mailing worm that also spreads through network shares and the Kazaa file-sharing network. The worm exploits the Microsoft Windows LSASS Buffer Overrun Vulnerability (described in Microsoft Security Bulletin [MS04-011]) and the DCOM RPC vulnerability (described in Microsoft Security Bulletin [MS03-026]) through TCP ports 135 and 445. It may also lower security settings and download remote files.

Email-Worm.Win32.Plexus.b / Unauthenticated Remote Code Execution - the malware listens on TCP ports 1250 (file write port) and 47435 (random FTP port). Third-party attackers who can reach infected systems can use a socket program to write binary data to the remote host. The malware then writes that data to a file named "_up.exe" under
"\Users\Victim\AppData\Local\Temp" that executes immediately.
References: [MVID-2021-0400]

swldy-sias (IANA official).
SG
1250 tcp threat W32.Explet Bekkoame
1250 tcp,udp swldy-sias swldy-sias IANA
3 records found
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About