“Teardrop”, “NewTear”, “Bonk”,
“Boink”, “Ping of Death”
Goal is to severely impair or disable a
host or its IP stack
Use packet fragmentation and
reassembly vulnerabilities
Require that a host IP stack be able to
receive a packet from an attacker