Port 68 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
68 |
udp |
bootp client |
Bootstrap protocol client. Used by client machines to obtain dynamic IP addressing information from a DHCP server.
The Avaya 4602 SW IP Phone (Model 4602D02A) with 2.2.2 and earlier SIP firmware allows remote attackers to cause a denial of service (device reboot) via a flood of packets to the BOOTP port (68/udp).
References: [CVE-2007-3321] [SECUNIA-25747] [OSVDB-38117]
NCP Secure Enterprise Client (aka VPN/PKI client) 8.30 Build 59, and possibly earlier versions, when the Link Firewall and Personal Firewall are both configured to block all inbound and outbound network traffic, allows context-dependent attackers to send inbound UDP traffic with source port 67 and destination port 68, and outbound UDP traffic with source port 68 and destination port 67.
References: [CVE-2006-3551]
Apple NetBoot also uses this port. |
SG
|
68 |
tcp |
trojan |
Backdoor.SubSeven [Symantec-2001-020114-5445-99] (1999.06.06)
Falco LX-4PRO also uses this port. |
SG
|
68 |
udp |
|
Bootstrap Protocol (BOOTP) Client; also used by Dynamic Host Configuration Protocol (DHCP) (official) |
Wikipedia
|
68 |
tcp,udp |
dhcpc |
DHCP/Bootstrap Protocol Client |
Nmap
|
68 |
tcp,udp |
bootpc |
Bootstrap Protocol Client |
IANA
|
|
5 records found
Related ports: 67
|