speedguide.net  

Port 264 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
264 tcp,udp bgmp Check Point FireWall-1 allows remote attackers to cause a denial of service (high CPU) via a flood of packets to port 264.
References: [CVE-2000-1201]

Check Point ports:
259 udp - MEP configuration
264 tcp - Topology download
500 tcp/udp - IKE
2746 udp - UDP Encapsulation.
18231 tcp - Policy Server logon, when the client is inside the network
18232 tcp - Distribution server when the client is inside the network
18233 udp - Keep-alive protocol when the client is inside the network
18234 udp - Performing tunnel test, when the client is inside the network
18264 tcp - ICA certificate registration

BGMP, Border Gateway Multicast Protocol (IANA official)
SG
264 tcp,udp BGMP, Border Gateway Multicast Protocol (official) Wikipedia
264 tcp bgmp bgmp Nmap
264 udp fw1-or-bgmp FW1 secureremote alternate Nmap
264 tcp,udp bgmp Border Gateway Multicast Protocol Neophasis
264 tcp fw1-topo Check Point VPN-1 topology download Neophasis
264 tcp FW1_topo FW1 can be flooded on this port in order to cause CPU utilization to reach 100% and stopping managers from connecting. However, it requires a fast link and access to that port, probably from the local network. Bekkoame
264 tcp,udp bgmp BGMP IANA
8 records found

Related ports: 259  500  2746  18231  18264  

News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About