Port 6556 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
6556 |
tcp |
multiple |
Check MK Agent uses this port.
check_mk could allow a local attacker to obtain sensitive information, caused by the creation of temporary insecure files by the check_mk_agent/job directory. A local attacker could exploit this vulnerability by creating a symbolic link from a temporary file to the service on port 6556, which could allow the attacker to gain access to files on the system and obtain sensitive information.
References: [XFDB-93520], [CVE-2014-0243], [BID-67674]
W32.Toxbot.C [Symantec-2005-063015-3130-99] (2005.06.30) - worm that opens a backdoor on the compromised computer. Spreads by exploiting common Windows vulnerabilities. Opens and IRC backdoor on port 6556/tcp.
Also: W32.Toxbot.AL [Symantec-2005-100715-4523-99] (2005.10.07).
Malware that uses port 6556/tcp:
AutoSpY trojan
W32.Toxbot |
SG
|
6556 |
tcp |
trojan |
AutoSpY |
Trojans
|
6556 |
tcp,udp |
threat |
W32.Toxbot |
Bekkoame
|
6552-6557 |
tcp,udp |
|
Unassigned |
IANA
|
|
4 records found
|