“Teardrop”, “Bonk”, “Boink”,
“Ping of Death”
•
Goal is to severely impair or disable a
host or its IP stack
•
Use packet fragmentation and
reassembly vulnerabilities
•
Require that a host IP stack be able to
receive a packet from an attacker