“Teardrop”, “NewTear”, “Bonk”,
“Boink”, “Ping of Death”
•
Goal is to severely impair or disable a
host or its IP stack
•
Use packet fragmentation and
reassembly vulnerabilities
•
Require that a host IP stack be able to
receive a packet from an attacker