{"id":"CVE-2019-13126","details":"An integer overflow in NATS Server before 2.0.2 allows a remote attacker to crash the server by sending a crafted request. If authentication is enabled, then the remote attacker must have first authenticated.","aliases":["GHSA-jp4j-47f9-2vc3","GO-2022-0852"],"modified":"2026-04-11T21:44:55.093271Z","published":"2019-07-29T17:15:11.467Z","related":["CGA-qqj3-x378-ggj3"],"references":[{"type":"FIX","url":"https://github.com/nats-io/nats-server/pull/1053"},{"type":"ARTICLE","url":"https://www.twistlock.com/labs-blog/finding-dos-vulnerability-nats-go-fuzz-cve-2019-13126/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nats-io/nats-server","events":[{"introduced":"0"},{"fixed":"6a40503f972e032881e43e1a1bcf30f2efe0e2e4"}],"database_specific":{"cpe":"cpe:2.3:a:linuxfoundation:nats-server:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"2.0.2"}],"source":"CPE_FIELD"}}],"versions":["v0.5.1","v0.5.2","v0.5.4","v0.5.6","v0.6.0","v0.6.2","v0.6.4","v0.6.6","v0.6.8","v0.7.0","v0.7.2","v0.8.0","v0.8.1","v0.9.2","v0.9.4","v0.9.6","v1.0.0","v1.0.2","v1.0.4","v1.0.6","v1.1.0","v1.2.0","v1.3.0","v2.0.0","v2.0.0-RC14","v2.0.0-RC19"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-13126.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}