speedguide.net  

Port 3628 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
3628 tcp applications Trend ServerProtect Agent service is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the RPCFN_CopyAUSrc function. By sending a specially-crafted RPC request to the SpntSvc.exe service on TCP port 3628, a remote attacker could overflow a buffer and execute arbitrary code on the system with SYSTEM privileges or cause the application to crash.
References: [CVE-2007-4218], [BID-25395]

Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote attackers to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the AgRpcCln.dll library in SpntSvc.exe; or (2) TCP port 3628, which triggers an overflow in EarthAgent.exe. NOTE: both issues are reachable via TmRpcSrv.dll.
References: [CVE-2007-2508] [SECUNIA-25186] [BID-23868] [OSVDB-35790]

Port is also IANA registered for EPT Machine Interface
SG
3628 tcp,udp ept-machine EPT Machine Interface, registered 2002-10 IANA
2 records found

Related ports: 5168  

News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About