Port 515 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
515 |
tcp |
printer |
Printing services, listening for incoming connections
Trojans using this port: MscanWorm, lpdw0rm, Ramen.
Multiple buffer overflows in Client Software WinCom LPD Total 3.0.2.623 and earlier allow remote attackers to execute arbitrary code via a long 0x02 command to the remote administration service on TCP port 13500 or a long invalid control filename to LPDService.exe on TCP port 515.
References: [CVE-2008-5176], [BID-27614]
Stack-based buffer overflow in Winlpd 1.26 allows remote attackers to execute arbitrary code via a long string in a request to TCP port 515.
References: [CVE-2006-3670] [SECUNIA-21058] [BID-19011] [OSVDB-27332]
Buffer overflow in NIPrint 4.10 allows remote attackers to execute arbitrary code via a long string to TCP port 515.
References: [CVE-2003-1141] [BID-8968] [OSVDB-2774] [SECUNIA-10143]
SAPlpd through 7400.3.11.33 in SAP GUI 7.40 on Windows has a Denial of Service vulnerability (service crash) with a long string to TCP port 515.
References: [CVE-2016-10079], [EDB-41030]
spooler (IANA official) |
SG
|
515 |
tcp |
|
Line Printer Daemon - print service (official) |
Wikipedia
|
515 |
tcp |
trojan |
MscanWorm, Ramen |
Trojans
|
515 |
tcp,udp |
printer |
spooler (lpd) |
Nmap
|
515 |
tcp |
lpdw0rm |
[trojan] lpdw0rm |
Neophasis
|
515 |
tcp |
Ramen |
[trojan] Ramen |
Neophasis
|
515 |
tcp,udp |
printer |
spooler |
IANA
|
|
7 records found
Related ports: 13500
|