CVE-2022-50799
Denial of Service in Fetch FTP Client via Long Server Responses
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fetch | ftp_client | 5.8.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Fetch FTP Client 5.8.2 allows attackers to cause a denial of service by sending specially crafted FTP server responses that exceed 2K bytes in length. These long responses trigger 100% CPU consumption, leading to excessive resource use and potentially crashing the application.
How can this vulnerability impact me? :
The vulnerability can cause the Fetch FTP Client application to consume all CPU resources, resulting in a denial of service. This can disrupt normal operations, cause application crashes, and potentially affect availability of services relying on this client.