Step 1: Fragmentation: The attacker crafts an IP packet and fragments it into multiple smaller packets. These fragments are designed to overlap or have incorrect offset values.
Step 2: Malformed Offsets: The attacker sets the fragment offset fields in the IP header of the fragmented packets to values that, when combined, cause the reassembly process to fail.
Step 3: Packet Delivery: The fragmented packets are sent to the target system, typically over a network connection.
Step 4: Reassembly Attempt: The target system's IP stack attempts to reassemble the fragmented packets based on the IP header information (ID, offset, and more fragments flag).
Step 5: Exploitation: Due to the malformed offsets, the reassembly process fails, leading to memory corruption, resource exhaustion, or a system crash.