Port 3010 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
3010 |
tcp |
applications |
Citrix NetScaler appliance uses port 3010 TCP for non-secure high availability configuration synchronization.
Multiple stack-based buffer overflows in FSD 2.052 d9 and earlier, and FSFDT FSD 3.000 d9 and earlier, allow (1) remote attackers to execute arbitrary code via a long HELP command on TCP port 3010 to the sysuser::exechelp function in sysuser.cc and (2) remote authenticated users to execute arbitrary code via long commands on TCP port 6809 to the servinterface::sendmulticast function in servinterface.cc, as demonstrated by a PIcallsign command.
References: [CVE-2007-5256] [BID-25883] [SECUNIA-27008]
Citrix NetScaler and Citrix NetScaler VPX are vulnerable to a denial of service, caused by an error in the nsconfigd daemon. By sending a specially-crafted message to TCP port 3008 and 3010, a remote attacker could exploit this vulnerability to cause the system to crash.
References: [BID-62788], [XFDB-87618]
Telerate Workstation (IANA official) |
SG
|
2000-2001, 2038, 2050, 2051, 2069, 2085, 3010, 3030 |
tcp |
applications |
ICUII |
Portforward
|
3010 |
tcp |
blazix-adm |
Blazix webserver administration port |
Neophasis
|
3010 |
tcp |
gw |
Telerate Workstation |
IANA
|
3010 |
udp |
ping-pong |
Telerate Workstation |
IANA
|
|
5 records found
Related ports: 3008 3009 3011 6809
|