speedguide.net  

Port 515 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
515 tcp printer Printing services, listening for incoming connections

Trojans using this port: MscanWorm, lpdw0rm, Ramen.

Multiple buffer overflows in Client Software WinCom LPD Total 3.0.2.623 and earlier allow remote attackers to execute arbitrary code via a long 0x02 command to the remote administration service on TCP port 13500 or a long invalid control filename to LPDService.exe on TCP port 515.
References: [CVE-2008-5176], [BID-27614]

Stack-based buffer overflow in Winlpd 1.26 allows remote attackers to execute arbitrary code via a long string in a request to TCP port 515.
References: [CVE-2006-3670] [SECUNIA-21058] [BID-19011] [OSVDB-27332]

Buffer overflow in NIPrint 4.10 allows remote attackers to execute arbitrary code via a long string to TCP port 515.
References: [CVE-2003-1141] [BID-8968] [OSVDB-2774] [SECUNIA-10143]

SAPlpd through 7400.3.11.33 in SAP GUI 7.40 on Windows has a Denial of Service vulnerability (service crash) with a long string to TCP port 515.
References: [CVE-2016-10079], [EDB-41030]

spooler (IANA official)
SG
515 tcp Line Printer Daemon - print service (official) Wikipedia
515 tcp trojan MscanWorm, Ramen Trojans
515 tcp,udp printer spooler (lpd) Nmap
515 tcp lpdw0rm [trojan] lpdw0rm Neophasis
515 tcp Ramen [trojan] Ramen Neophasis
515 tcp,udp printer spooler IANA
7 records found

Related ports: 13500  

News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About