Port 1978 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1978 |
udp |
worm-linux |
Linux.Slapper.Worm [Symantec-2002-091311-5851-99] (2002.09.13) - family of worms that use an "OpenSSL buffer overflow exploit [CVE-2002-0656] to run a shell on a remote computer. Targets vulnerable Apache Web servers under various Linux distributions. The worm has distributed denial of service (DDoS) attack capabilities. It spreads by exploiting ports 80/tcp and 443/tcp. Opens backdoors on the following ports: 2002/udp (.A variant), 1978/udp (.B variant), 4156/udp and 1052/tcp periodically (.C variant).
WiFi Mouse 1.7.8.5 - Remote Code Execution
References: [EDB-49601] |
SG
|
1978 |
tcp |
malware |
Trojan.Win32 Bankshot / Remote Stack Buffer Overflow (SEH) - the malware listens on TCP port 1978 and creates a local
Windows service running with SYSTEM integrity. Third-party adversaries who can reach the server can send a specially crafted payload triggering a stack buffer overflow overwriting ECX, EIP registers and Structured Exception Handler (SEH).
|
SG
|
1978 |
udp |
trojan |
Slapper |
Trojans
|
1978 |
tcp,udp |
unisql |
UniSQL |
IANA
|
|
4 records found
Related ports: 1052 2002 4156
|