speedguide.net  

Port 6661 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
6661 tcp applications Internet Relay Chat

BigAnt IM Sever is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when processing TCP requests by AntServer.exe. By sending a specially-crafted DDNF command containing an overly long string to TCP port 6661, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
References: [XFDB-83351], [EDB-24943]

Trojans using this port: Weia-Meia, TEMan
SG
6661 tcp trojan [trojan] Weia-Meia Trojans
6661 tcp TEMan [trojan] TEMan SANS
6661 tcp Weia-Meia [trojan] Weia-Meia SANS
6660-6664 tcp Internet Relay Chat (unofficial) Wikipedia
6658-6664 tcp,udp Unassigned. Unauthorized Use Known on Port 6659 IANA
6 records found

Related ports: 6660  6662  6663  6664  6665  6666  6667  6668  6669  

News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About