Handler on Duty: Guy Bruneau
Threat Level: green
Thinking...
|
|
||||||||||||||||||||||||||||||||||
| URL |
|---|
| Law, spam, and 4899tcp |
| A day in the life of a firewall log |
| TCP scanning increase for 4899 |
| Submitted By | Date |
|---|---|
| Comment | |
| Timo Steffens | 2009-10-04 18:34:16 |
| On the following forum there is a post (#13) describing how to determine whether a packet was really intended for radmin (static identification data) : http://www.governmentsecurity.org/forum/index.php?showtopic=7866 | |
| 2004-10-28 05:52:28 | |
| http://www.pestpatrol.com/PestInfo/r/remote_administrator__rat_.asp | |
| Ronaldo Vasconcellos | 2004-08-23 22:42:38 |
| More info on 4899 TCP on: [VulnWatch] SECNAP Security Alert: Radmin Default install options vulnerability http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0099.html As stated just above, there�s a known vulnerability related to this service (radmin). The intent of this post is just to provide you with more info about this vuln. | |
| Paulo Sedrez | 2004-07-23 04:58:32 |
| There is a known remote exploitable vulnerability in radmin server versions 2.0 and 2.1 that allows code execution. | |
| CVE # | Description |
|---|
