id: GO-2020-0019 | |
modules: | |
- module: github.com/gorilla/websocket | |
versions: | |
- fixed: 1.4.1 | |
vulnerable_at: 1.4.0 | |
packages: | |
- package: github.com/gorilla/websocket | |
symbols: | |
- Conn.advanceFrame | |
- messageReader.Read | |
derived_symbols: | |
- Conn.Close | |
- Conn.NextReader | |
- Conn.NextWriter | |
- Conn.ReadJSON | |
- Conn.ReadMessage | |
- Conn.WriteControl | |
- Conn.WriteJSON | |
- Conn.WriteMessage | |
- Conn.WritePreparedMessage | |
- Dialer.Dial | |
- Dialer.DialContext | |
- NewClient | |
- NewPreparedMessage | |
- ReadJSON | |
- Subprotocols | |
- Upgrade | |
- Upgrader.Upgrade | |
- WriteJSON | |
- flateReadWrapper.Read | |
- flateWriteWrapper.Close | |
- flateWriteWrapper.Write | |
- httpProxyDialer.Dial | |
- messageWriter.Close | |
- messageWriter.ReadFrom | |
- messageWriter.Write | |
- messageWriter.WriteString | |
- netDialerFunc.Dial | |
- proxy_direct.Dial | |
- proxy_envOnce.Get | |
- proxy_socks5.Dial | |
- truncWriter.Write | |
summary: Integer overflow in github.com/gorilla/websocket | |
description: |- | |
An attacker can craft malicious WebSocket frames that cause an integer overflow | |
in a variable which tracks the number of bytes remaining. This may cause the | |
server or client to get stuck attempting to read frames in a loop, which can be | |
used as a denial of service vector. | |
published: 2021-04-14T20:04:52Z | |
cves: | |
- CVE-2020-27813 | |
ghsas: | |
- GHSA-3xh2-74w9-5vxm | |
credits: | |
- Max Justicz | |
references: | |
- fix: https://github.com/gorilla/websocket/pull/537 | |
- fix: https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37 |