When an attacker sends illegitimate, oversized ICMP (ping) packets. These attacks are targeted at specific TCP stacks that cannot handle this type of packet and overload the victim's servers.
A denial of service attack where malicious users send one or multiple 64-KB ICMP Echo Request messages. The 64-KB messages are fragmented and must be reassembled at the destination host. For each separate 64-KB message, the TCP/IP protocol must allocate memory, tables, timers, and other resources. With enough fragmented messages, a host can become bogged down so that the servicing of valid information requests is impaired.
The ping of death is a method of using the ping command to freeze or reboot the computer by sending a packet greater than 65536 bytes. Today, all new operating systems and older operating systems with the appropriate updates are not affected by this issue.
A denial-of-service attack where an attacker sends an oversized ping packet intended to cause the receiving machines to crash when they attempt to reassemble the large data packet.
A hacking technique used to cause a denial-of-service attack by sending a large ICMP packet to a target. As the target tries to reassemble the packet, the packet size overflows the buffer and can cause the target to reboot or freeze. See also buffer overflow
The Ping of Death is a denial-of-service attack that crashes servers by sending invalid IP ping packets.