{"id":"CVE-2020-27813","details":"An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker would use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.","aliases":["GHSA-3xh2-74w9-5vxm","GHSA-jf24-p9p9-4rjh","GO-2020-0019"],"modified":"2026-03-19T12:40:50.885639Z","published":"2020-12-02T01:15:12.780Z","related":["GHSA-jf24-p9p9-4rjh"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00012.html"},{"type":"ADVISORY","url":"https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00008.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902111"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gorilla/websocket","events":[{"introduced":"0"},{"fixed":"c3e18be99d19e6b3e8f1559eea2c161a665c4b6b"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.4.1"}]}}],"versions":["v1.0.0","v1.1.0","v1.2.0","v1.3.0","v1.4.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-27813.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}