speedguide.net  

Port 3010 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
3010 tcp applications Citrix NetScaler appliance uses port 3010 TCP for non-secure high availability configuration synchronization.

Multiple stack-based buffer overflows in FSD 2.052 d9 and earlier, and FSFDT FSD 3.000 d9 and earlier, allow (1) remote attackers to execute arbitrary code via a long HELP command on TCP port 3010 to the sysuser::exechelp function in sysuser.cc and (2) remote authenticated users to execute arbitrary code via long commands on TCP port 6809 to the servinterface::sendmulticast function in servinterface.cc, as demonstrated by a PIcallsign command.
References: [CVE-2007-5256] [BID-25883] [SECUNIA-27008]

Citrix NetScaler and Citrix NetScaler VPX are vulnerable to a denial of service, caused by an error in the nsconfigd daemon. By sending a specially-crafted message to TCP port 3008 and 3010, a remote attacker could exploit this vulnerability to cause the system to crash.
References: [BID-62788], [XFDB-87618]

Telerate Workstation (IANA official)
SG
2000-2001, 2038, 2050, 2051, 2069, 2085, 3010, 3030 tcp applications ICUII Portforward
3010 tcp blazix-adm Blazix webserver administration port Neophasis
3010 tcp gw Telerate Workstation IANA
3010 udp ping-pong Telerate Workstation IANA
5 records found

Related ports: 3008  3009  3011  6809  

News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About