Files
JargonFile/original/html/P/Ping-O--Death.html

15 lines
2.6 KiB
HTML
Raw Normal View History

2014-03-27 18:54:56 +00:00
<?xml version="1.0" encoding="ISO-8859-1" standalone="no"?>
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Ping O' Death</title><link rel="stylesheet" href="../../jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="../index.html" title="The Jargon File"/><link rel="up" href="../P.html" title="P"/><link rel="previous" href="ping.html" title="ping"/><link rel="next" href="ping-storm.html" title="ping storm"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Ping O' Death</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="ping.html">Prev</a><EFBFBD></td><th width="60%" align="center">P</th><td width="20%" align="right"><EFBFBD><a accesskey="n" href="ping-storm.html">Next</a></td></tr></table><hr/></div><dt><a id="Ping-O--Death"/><dt xmlns="" id="Ping-O--Death"><b>Ping O' Death</b>: <span xmlns="http://www.w3.org/1999/xhtml" class="grammar">n.</span></dt></dt><dd><p> A notorious <a href="../E/exploit.html"><i class="glossterm">exploit</i></a> that (when first
discovered) could be easily used to crash a wide variety of machines by
overrunning size limits in their TCP/IP stacks. First revealed in late
1996. The open-source Unix community patched its systems to remove the
vulnerability within days or weeks, the closed-source OS vendors generally
took months. While the difference in response times repeated a pattern
familiar from other security incidents, the accompanying glare of
Web-fueled publicity proved unusually embarrassing to the OS vendors and so
passed into history and myth. The term is now used to refer to any nudge
delivered by network wizards over the network that causes bad things to
happen on the system being nudged. For the full story on the original
exploit, see <a href="http://www.insecure.org/sploits/ping-o-death.html" target="_top">http://www.insecure.org/sploits/ping-o-death.html</a>. Compare
<a href="../K/kamikaze-packet.html"><i class="glossterm">kamikaze packet</i></a> and 'Chernobyl packet.'</p></dd><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="ping.html">Prev</a><EFBFBD></td><td width="20%" align="center"><a accesskey="u" href="../P.html">Up</a></td><td width="40%" align="right"><EFBFBD><a accesskey="n" href="ping-storm.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">ping<EFBFBD></td><td width="20%" align="center"><a accesskey="h" href="../index.html">Home</a></td><td width="40%" align="right" valign="top"><EFBFBD>ping storm</td></tr></table></div></body></html>