CyberGlossary

Attacks & Threats

Teardrop Attack

Definition

A legacy DoS attack that sends IP fragments with overlapping, malformed offsets to crash TCP/IP stacks that mishandle reassembly.

A teardrop attack sends a series of IP fragments whose offset and length fields overlap or otherwise create impossible reassembly conditions. Older TCP/IP implementations — notably Windows 3.1x, 95, NT 4.0, and certain Linux 2.0 kernels — failed to validate these fields and crashed or hung when attempting to merge the fragments. Modern operating systems fixed the underlying logic, but conceptually similar fragment-overlap bugs continue to be found in less-tested stacks (IoT, mobile basebands, IPv6 implementations). Defences include keeping operating systems patched, perimeter filtering of overlapping or unusually small IP fragments, deep packet inspection, and rigorous fuzz testing of network code paths.

Examples

  • An attacker sends crafted UDP fragments with overlapping offsets that crash an unpatched Windows NT 4 server.
  • A modern variant exploits overlap-handling bugs in an embedded IPv6 stack to reboot a smart sensor.

Related terms