home/glossary/Tiny Fragment Attack

Tiny Fragment Attack

nouncandidate·updated May 9, 2026

With many IP implementations it is possible to impose an unusually small fragment size on outgoing packets. If the fragment size is made small enough to force some of a TCP packet's TCP header fields into the second fragment, filter rules that specify patterns for those fields will not match. If the filtering implementation does not enforce a minimum fragment size, a disallowed packet might be passed because it didn't hit a match in the filter. STD 5, RFC 791 states: Every Internet module must be able to forward a datagram of 68 octets without further fragmentation. This is because an Internet header may be up to 60 octets, and the minimum fragment is 8 octets.

MWE

Classifications

Entity Type

Threat92%llm-generatedllm:claude-haiku-4-5
?unassignedlast reviewed

Sensitivity

unclassified

Information Class

unclassified

Variants

plural
Tiny Fragment Attacks
possessive
Tiny Fragment Attack's
pluralpossessive
Tiny Fragment Attacks'