speedguide.net  

Port 32778 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
32778 tcp,udp applications Novell Netware is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the xdrDecodeString() function in the XNFS.NLM component when processing NFS requests. By sending a specially-crafted NFS RPC request to UDP or TCP port 32778, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the server to crash.
References: [CVE-2011-4191] [XFDB-71459] [EDB-18351]
SG
32778 tcp sometimes-rpc19 Sometimes an RPC port on my Solaris box (rstatd) SANS
32778 udp sometimes-rpc20 Sometimes an RPC port on my Solaris box (rstatd) SANS
32778 tcp sometimes-rpc19 Sometimes an RPC port on my Solaris box (rstatd) Nmap
32778 udp sometimes-rpc20 Sometimes an RPC port on my Solaris box (rstatd) Nmap
32778-32800 tcp,udp Unassigned IANA
32778-32800 tcp,udp Unassigned IANA
7 records found
News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About