Re: Say it isn't so!
I used to use such exploits to defend my IRC channel from those pesky Russian kids back in the day. "Ping of Death" didn't work for very long, much like OOB "nukes" (the winsock 2 update eliminated those) but there were still other packet fragmentation attacks like "Land" and "Bonk/Boink" and "Smurf" (if you knew what you were doing... as a last resort) that worked. I had a program that could generate those (and custom) attacks on a Windows machine by virtualizing its own TCP/IP stack (Windows lacked any raw socket functionality for spoofing packets) and hooking into your modem directly using the i/o port. (e.g. 02F8) It was funny that you could take down just about anyone with a few packets on a dialup connection.
I had a precoded attack for unpatched (Linux 2.0.something or earlier) Linux kernels too, called "Nestea" that was also similarly a fragmentation attack (kernel oops on trying to assemble offset packet fragments if I recall)
It's funny that Microsoft got something like that wrong again :-)