speedguide.net  

Port 3010 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
3010 tcp applications Citrix NetScaler appliance uses port 3010 TCP for non-secure high availability configuration synchronization.

Multiple stack-based buffer overflows in FSD 2.052 d9 and earlier, and FSFDT FSD 3.000 d9 and earlier, allow (1) remote attackers to execute arbitrary code via a long HELP command on TCP port 3010 to the sysuser::exechelp function in sysuser.cc and (2) remote authenticated users to execute arbitrary code via long commands on TCP port 6809 to the servinterface::sendmulticast function in servinterface.cc, as demonstrated by a PIcallsign command.
References: [CVE-2007-5256] [BID-25883] [SECUNIA-27008]

Citrix NetScaler and Citrix NetScaler VPX are vulnerable to a denial of service, caused by an error in the nsconfigd daemon. By sending a specially-crafted message to TCP port 3008 and 3010, a remote attacker could exploit this vulnerability to cause the system to crash.
References: [BID-62788], [XFDB-87618]

Telerate Workstation (IANA official)
SG
2000-2001, 2038, 2050, 2051, 2069, 2085, 3010, 3030 tcp applications ICUII Portforward
3010 tcp blazix-adm Blazix webserver administration port Neophasis
3010 tcp gw Telerate Workstation IANA
3010 udp ping-pong Telerate Workstation IANA
5 records found

Related ports: 3008  3009  3011  6809  

News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About