Integer overflow in the PulseAudioTargetDataL class in src/java/org/classpath/icedtea/pulseaudio/PulseAudioTargetDataLine.java in Pulse-Java, as used in OpenJDK 1.6.0.0 and other products, allows remote attackers to cause a denial of service (applet crash) via a crafted Pulse Audio source data line.
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00204.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00203.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/50383
https://bugzilla.redhat.com/show_bug.cgi?id=492367
http://www.vupen.com/english/advisories/2009/0965
http://www.mandriva.com/security/advisories?name=MDVSA-2009:162
http://www.mandriva.com/security/advisories?name=MDVSA-2009:137
http://secunia.com/advisories/34623
http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2009-February/004729.html