Port 6789 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
6789 |
tcp |
trojans |
Campbell Scientific Loggernet Software
Bucky's Instant Messaging Program
W32.Netsky.T@mm [Symantec-2004-040616-1824-99] (2004.04.06) - a Netsky variant that uses its own SMTP engine to email itself. It has backdoor and DoS (Denial of Service) capabilities. Listens on port 6789/tcp to receive and execute a file from an attacker.
The W32.Netsky.S@mm [Symantec-2004-040512-2436-99] variant opens this port as well.
Doly Trojan also uses port 6789 (TCP).
Multiple buffer overflows in the DB2 JDBC Applet Server (DB2JDS) service in IBM DB2 9.x and earlier allow remote attackers to execute arbitrary code via a crafted packet to the DB2JDS service on tcp/6789 and cause a denial of service via an invalid LANG parameter or a long packet that generates a "MemTree overflow."
References: [CVE-2007-2582], [BID-26010]
IANA registered for: GSS-API for Oracle Remote Administration Daemon |
SG
|
6789 |
tcp |
|
Datalogger Support Software Campbell Scientific Loggernet Software (unofficial) |
Wikipedia
|
6789 |
tcp |
ibm-db2-admin |
dB2 Web Control Center |
SANS
|
6789 |
tcp |
ibm-db2-admin |
IBM DB2 |
Nmap
|
6789 |
tcp |
threat |
W32.Netsky |
Bekkoame
|
6789 |
tcp |
radg |
GSS-API for the Oracle Remote Administration Daemon, registered 2002-08, modified: 2016-09-15 |
IANA
|
6789 |
udp |
|
Reserved, registered 2002-08, modified: 2016-09-15 |
IANA
|
|
7 records found
Related ports: 6786 6787 6788
|