Handler on Duty: Jim Clausing
Threat Level: green
Thinking...
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
| URL |
|---|
| Port 2000 spike; New IIS PCT exploit?; Following the bouncing MS patches |
| Submitted By | Date |
|---|---|
| Comment | |
| 2015-11-08 03:30:42 | |
| Looks like YouDao or 163.com (which owns YouDao) uses port 2000 for an unknown piece of software | |
| Crispin Harris | 2010-10-27 18:37:05 |
| According the Wikipedia, this was also used for Cisco Skinny (SCCP) VoIP services | |
| 2007-01-10 17:30:56 | |
| steckvaughn.harcourtachieve.com uses port 2000 for their GED server/workstation | |
| SkitZZ | 2004-11-09 18:02:45 |
| don't know if your aware or not but a week or so ago there was a buffer-overflow vulnerability found in ShixxNOTE 6.net http://www.securityfocus.com/bid/11409/info/ which runs on port 2000. | |
| George Ascione, LightHouse Hosting | 2004-11-09 18:02:39 |
| We recently evaluated a copy of RemotelyAnywhere. That software service listens on port 2000 by default. I don't know of anything in particular that may link the increase to this but RemotelyAnywhere when installed with the defaults will be out there listening on this port. | |
| Gary Weichbrodt | 2004-11-09 18:02:29 |
| P2P Radio uses this port as well. http://p2p-radio.sourceforge.net/ | |
| CVE # | Description |
|---|
