Sure it's possible.. Anything is possible, given the right (or wrong) conditions.
Sometimes, this tactic is used to mount (I believe) a DoS attack on a server (Denial of Service) by crippling the server by means of a full hard disk.
Is there some specific example or situation or application you are concerned with, or is this a hypothetical question?
SVA