JargonFile/original/html/P/Ping-O--Death.html
2014-03-27 18:54:56 +00:00

15 lines
2.6 KiB
HTML
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="ISO-8859-1" standalone="no"?>
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Ping O' Death</title><link rel="stylesheet" href="../../jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="../index.html" title="The Jargon File"/><link rel="up" href="../P.html" title="P"/><link rel="previous" href="ping.html" title="ping"/><link rel="next" href="ping-storm.html" title="ping storm"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Ping O' Death</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="ping.html">Prev</a> </td><th width="60%" align="center">P</th><td width="20%" align="right"> <a accesskey="n" href="ping-storm.html">Next</a></td></tr></table><hr/></div><dt><a id="Ping-O--Death"/><dt xmlns="" id="Ping-O--Death"><b>Ping O' Death</b>: <span xmlns="http://www.w3.org/1999/xhtml" class="grammar">n.</span></dt></dt><dd><p> A notorious <a href="../E/exploit.html"><i class="glossterm">exploit</i></a> that (when first
discovered) could be easily used to crash a wide variety of machines by
overrunning size limits in their TCP/IP stacks. First revealed in late
1996. The open-source Unix community patched its systems to remove the
vulnerability within days or weeks, the closed-source OS vendors generally
took months. While the difference in response times repeated a pattern
familiar from other security incidents, the accompanying glare of
Web-fueled publicity proved unusually embarrassing to the OS vendors and so
passed into history and myth. The term is now used to refer to any nudge
delivered by network wizards over the network that causes bad things to
happen on the system being nudged. For the full story on the original
exploit, see <a href="http://www.insecure.org/sploits/ping-o-death.html" target="_top">http://www.insecure.org/sploits/ping-o-death.html</a>. Compare
<a href="../K/kamikaze-packet.html"><i class="glossterm">kamikaze packet</i></a> and 'Chernobyl packet.'</p></dd><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="ping.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="../P.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="ping-storm.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">ping </td><td width="20%" align="center"><a accesskey="h" href="../index.html">Home</a></td><td width="40%" align="right" valign="top"> ping storm</td></tr></table></div></body></html>