Port 660 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
660 |
tcp,udp |
mac-srvr-admin |
Mac OS X Server administration
Zaratustra trojan also uses this port (TCP).
Buffer overflow in the GUI admin service in Mac OS X Server 10.3 allows remote attackers to cause a denial of service (crash and restart) via a large amount of data to TCP port 660.
References: [CVE-2004-1832], [BID-9914]
Backdoor.Win32.Zaratustra / Unauthenticated Remote File Write (Remote Code Exec) - Zaratustra malware listens on TCP port 660. Third-party attackers who can reach infected systems can use a socket program to write binary data to execute. The malware then writes that data to a file named "x.exe" under c: drive and will execute upon completion of the downloaded code.
References: [MVID-2021-0315] |
SG
|
660 |
tcp |
|
Mac OS X Server administration (official) |
Wikipedia
|
660 |
tcp,udp |
mac-srvr-admin |
MacOS Server Admin |
IANA
|
|
3 records found
Related ports: 311
|