Port 513 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
513 |
udp |
applications |
Multiple buffer overflows in the Syslog server in ManageEngine EventLog Analyzer 6.1 allow remote attackers to cause a denial of service (SysEvttCol.exe process crash) or possibly execute arbitrary code via a long Syslog PRI message header to UDP port 513 or 514.
References: [CVE-2010-4840] |
SG
|
513 |
tcp |
trojans |
ADM worm, Grlogin
UTStarcom F1000 VOIP WIFI Phone s2.0 running VxWorks 5.5.1 with kernel WIND 2.6 does not allow users to disable access to (1) SNMP or (2) the rlogin port TCP 513, which allows remote attackers to exploit other vulnerabilities such as CVE-2005-3716, or execute arbitrary shell commands via rlogin, which does not require authentication.
References: [CVE-2005-3718] [SECUNIA-17629] [BID-15476]
The Emerson DeltaV SE3006 through 11.3.1, DeltaV VE3005 through 10.3.1 and 11.x through 11.3.1, and DeltaV VE3006 through 10.3.1 and 11.x through 11.3.1 allow remote attackers to cause a denial of service (device restart) via a crafted packet on (1) TCP port 23, (2) UDP port 161, or (3) TCP port 513.
References: [CVE-2012-4703] |
SG
|
513 |
tcp |
|
Login (official) |
Wikipedia
|
513 |
udp |
|
Who (official) |
Wikipedia
|
513 |
tcp |
trojan |
ADM worm |
Trojans
|
513 |
tcp |
Grlogin |
[trojan] Grlogin |
SANS
|
513 |
tcp |
login |
BSD rlogind(8) |
SANS
|
513 |
udp |
who |
BSD rwhod(8) |
SANS
|
513 |
tcp |
login |
BSD rlogind(8) |
Nmap
|
513 |
udp |
who |
BSD rwhod(8) |
Nmap
|
513 |
tcp |
login |
"remote login a la telnet; automatic authentication performed based on priviledged port numbers and distributed data bases which identify ""authentication domains""" |
IANA
|
513 |
udp |
who |
maintains data bases showing who's logged in to machines on a local net and the load average of the machine |
IANA
|
|
12 records found
Related ports: 514 23 161
|