speedguide.net  

Port 520 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
520 udp router RIP (Routing Information Protocol). Routers use RIP in order to advertise routing information to each other and communicate optimal paths.

References: [RFC 1058] & [RFC 2453]

Cisco NX-OS is vulnerable to a denial of service, caused by an error in the Routing Information Protocol (RIP) service engine. By sending a specially-crafted RIPv4 or RIPv6 message to UDP port 520, a remote attacker could exploit this vulnerability to cause the RIP service engine to restart.
References: [CVE-2012-4091] [XFDB-87669] [BID-62838]

A UDP backdoor also uses this port.
SG
520 tcp efs ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.
References: [CVE-2010-3616], [BID-45360]

Port IANA registered for Extended File Name Server
SG
520 tcp efs, extended file name server (official) Wikipedia
520 udp Routing - RIP (official) Wikipedia
520 udp trojan A UDP backdoor Trojans
520 udp route router routed -- RIP SANS
520 udp route router routed -- RIP Nmap
520 tcp efs extended file name server IANA
520 udp router local routing process (on site); uses variant of Xerox NS routing information protocol - RIP IANA
9 records found
News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About