<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.xu-intarea-vulnerabilities-forged-icmp" target="https://datatracker.ietf.org/doc/html/draft-xu-intarea-vulnerabilities-forged-icmp-01">
   <front>
      <title>Problem Statement for Cross-Layer Vulnerabilities due to Forged ICMP Errors</title>
      <author initials="K." surname="Xu" fullname="Ke Xu">
         <organization>Tsinghua University &amp; Zhongguancun Laboratory</organization>
      </author>
      <author initials="X." surname="Feng" fullname="Xuewei Feng">
         <organization>Tsinghua University</organization>
      </author>
      <author initials="L." surname="Qi" fullname="Li Qi">
         <organization>Tsinghua University &amp; Zhongguancun Laboratory</organization>
      </author>
      <author initials="Z." surname="Li" fullname="Zhaoxi Li">
         <organization>Tsinghua University</organization>
      </author>
      <date month="November" day="3" year="2025" />
      <abstract>
	 <t>   ICMP error messages are vital for network reliability, providing
   feedback on issues such as unreachable hosts or fragmentation
   requirements.  They help devices adapt dynamically, support
   troubleshooting, and enable essential functions like Path MTU
   Discovery.  However, off-path attackers on the Internet may forge
   ICMP error messages to bypass legitimate validation mechanisms,
   causing the victim&#x27;s TCP/IP stack to misinterpret network conditions
   and exposing critical vulnerabilities.  This document analyzes how
   such forged ICMP errors can be exploited by off-path attackers to
   induce cross-layer interactions within the victim&#x27;s TCP/IP stack,
   leading to four classes of vulnerabilities: information leakage,
   desynchronization of shared variables, semantic gaps, and identity
   deception.  These ICMP-based attacks allow off-path attackers to
   manipulate network traffic, disrupt communication flows, and
   compromise both infrastructure and user privacy, without being on the
   direct communication path.  The document concludes with proposed
   countermeasures and recommendations for protocol evolution.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-xu-intarea-vulnerabilities-forged-icmp-01" />
   
</reference>
