Port 2049 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
2049 |
tcp,udp,sctp |
NFS |
Network File System (NFS) - remote filesystem access [RFC 1813] [RFC5665]. A commonly scanned and exploited attack vector. Normally, port scanning is needed to find which port this service runs on, but since most installations run NFS on this port, hackers/crackers can bypass fingerprinting and try this port directly.
shilp also uses port 2049 (UDP).
FreeBSD is vulnerable to a denial of service attack. A remote attacker could send a specially-crafted NFS Mount request to TCP port 2049 to cause a kernel panic, resulting in a denial of service.
References: [CVE-2006-0900] [BID-16838]
Stack-based buffer overflow in nfsd.exe in XLink Omni-NFS Server 5.2 allows remote attackers to execute arbitrary code via a crafted TCP packet to port 2049 (nfsd), as demonstrated by vd_xlink.pm.
References: [CVE-2006-5780] [BID-20941] [SECUNIA-22751]
Novell Netware is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the xnfs.nlm component when processing NFS requests. By sending a specially-crafted NFS RPC request to UDP port 2049, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the server to crash.
References: [XFDB-72199] |
SG
|
2049 |
udp |
|
Network File System (official) |
Wikipedia
|
2049 |
udp |
|
shilp (official) |
Wikipedia
|
2049 |
tcp,udp |
nfs |
networked file system |
Nmap
|
2049 |
tcp,udp |
nfs |
Network File System |
Neophasis
|
2049 |
tcp,udp |
shilp |
shilp |
Neophasis
|
2049 |
tcp,udp |
nfs |
Network File System - Sun Microsystems |
IANA
|
2049 |
sctp |
nfs |
Network File System [RFC5665] |
IANA
|
|
8 records found
Related ports: 20049
|