speedguide.net  

Port 2766 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
2766 tcp trojan W32.HLLW.Deadhat [Symantec-2004-020619-0805-99] (2004.02.06) - a worm with backdoor capabilities. It attempts to uninstall the W32.Mydoom.A@mm and W32.Mydoom.B@mm worms, and then it spreads to other systems infected with Mydoom. Also, it spreads through the Soulseek file-sharing program.

Buffer overflow in nlps_server in Sun Solaris x86 2.4, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code as root via a long string beginning with "NLPS:002:002:" to the listen (a.k.a. System V listener) port, TCP port 2766.
References: [CVE-1999-1588], [BID-2319]
SG
2766 udp games Tachyon - The Fringe SG
2766 tcp listen System V listener port SANS
2766 tcp nlps Solaris Print Services SANS
2766 tcp listen System V listener port Nmap
2766 tcp threat W32.HLLW.Deadhat Bekkoame
2766 tcp used by Solaris listen/nlps_server. It was part of System V R3 and Solaris. In much the same way that scanning for tcpmux will fingerprint SGI machines, scanning for this port will fingerprint SVR3 (Solaris 2.0) machines. Bekkoame
2766 tcp,udp compaq-scp Compaq SCP IANA
2700-2800 tcp KnowShowGo P2P (official) Wikipedia
9 records found

Related ports: 1080  3127  3128  

News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About