Teardrop attack: The exploitation of features of the TCP/IP protocol whereby large packets of data are split into ‘bite-sized chunks’ with each fragment being identified to the next by an ‘offset’ marker. Later the fragments are supposed to be re-assembled by the receiving system. In the teardrop attack, the attacker enters a confusing offset value in the second (or later) fragment which can crash the recipient’s system.
One Comment