This vulnerability is commonly used to hang remote systems and sometimes force them to reboot, which ultimately results in denial of service, means denying the valid services by Networks to the legitimate and authenticated users. This attack no longer works as most of the system administrators upgraded their systems, making them safe from such type of serious attacks.