Port 2766 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
2766 |
tcp |
trojan |
W32.HLLW.Deadhat [Symantec-2004-020619-0805-99] (2004.02.06) - a worm with backdoor capabilities. It attempts to uninstall the W32.Mydoom.A@mm and W32.Mydoom.B@mm worms, and then it spreads to other systems infected with Mydoom. Also, it spreads through the Soulseek file-sharing program.
Buffer overflow in nlps_server in Sun Solaris x86 2.4, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code as root via a long string beginning with "NLPS:002:002:" to the listen (a.k.a. System V listener) port, TCP port 2766.
References: [CVE-1999-1588], [BID-2319] |
SG
|
2766 |
udp |
games |
Tachyon - The Fringe |
SG
|
2766 |
tcp |
listen |
System V listener port |
SANS
|
2766 |
tcp |
nlps |
Solaris Print Services |
SANS
|
2766 |
tcp |
listen |
System V listener port |
Nmap
|
2766 |
tcp |
threat |
W32.HLLW.Deadhat |
Bekkoame
|
2766 |
tcp |
|
used by Solaris listen/nlps_server. It was part of System V R3 and Solaris. In much the same way that scanning for tcpmux will fingerprint SGI machines, scanning for this port will fingerprint SVR3 (Solaris 2.0) machines. |
Bekkoame
|
2766 |
tcp,udp |
compaq-scp |
Compaq SCP |
IANA
|
2700-2800 |
tcp |
|
KnowShowGo P2P (official) |
Wikipedia
|
|
9 records found
Related ports: 1080 3127 3128
|