speedguide.net  

Port 2766 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
2766 tcp trojan W32.HLLW.Deadhat [Symantec-2004-020619-0805-99] (2004.02.06) - a worm with backdoor capabilities. It attempts to uninstall the W32.Mydoom.A@mm and W32.Mydoom.B@mm worms, and then it spreads to other systems infected with Mydoom. Also, it spreads through the Soulseek file-sharing program.

Buffer overflow in nlps_server in Sun Solaris x86 2.4, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code as root via a long string beginning with "NLPS:002:002:" to the listen (a.k.a. System V listener) port, TCP port 2766.
References: [CVE-1999-1588], [BID-2319]
SG
2766 udp games Tachyon - The Fringe SG
2766 tcp listen System V listener port SANS
2766 tcp nlps Solaris Print Services SANS
2766 tcp listen System V listener port Nmap
2766 tcp threat W32.HLLW.Deadhat Bekkoame
2766 tcp used by Solaris listen/nlps_server. It was part of System V R3 and Solaris. In much the same way that scanning for tcpmux will fingerprint SGI machines, scanning for this port will fingerprint SVR3 (Solaris 2.0) machines. Bekkoame
2766 tcp,udp compaq-scp Compaq SCP IANA
2700-2800 tcp KnowShowGo P2P (official) Wikipedia
9 records found

Related ports: 1080  3127  3128  

News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About