Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files

Posted on November 20, 2025November 20, 2025 By CWS

A extreme vulnerability in Ollama, considered one of GitHub’s hottest open-source tasks, with over 155,000 stars. The flaw allows attackers to execute arbitrary code on methods operating susceptible variations of the platform by exploiting weaknesses within the software program’s parsing of mannequin recordsdata.

Ollama is a extensively used software that enables builders and AI specialists to run giant language fashions domestically with out counting on exterior providers like OpenAI.

The platform helps quite a few open-source fashions, together with gpt-oss, DeepSeek-R1, Meta’s Llama4, and Google’s Gemma3.

client-server structure of Ollama

Sonarsource researchers discovered a vital Out-Of-Bounds Write vulnerability throughout safety auditing of Ollama’s codebase.

The vulnerability impacts all Ollama variations earlier than 0.7.0 and exists within the mannequin file parsing mechanism. When processing specifically crafted GGUF mannequin recordsdata, the software program fails to validate particular metadata values correctly.

Particularly, in the course of the parsing of mllama fashions, the code doesn’t confirm whether or not indices specified within the mannequin’s metadata fall inside acceptable bounds. This oversight permits attackers to govern reminiscence past allotted boundaries.

The exploitation path includes creating malicious mannequin recordsdata with outsized metadata entries or invalid layer indices. When Ollama processes these recordsdata, the vulnerability triggers an Out-Of-Bounds Write situation.

mannequin file to substantiate OOB write

Attackers who achieve entry to Ollama’s API can load and execute these weaponized fashions, reaching distant code execution on the goal system.

Sonarsource confirmed the vulnerability is exploitable in builds with out Place Impartial Executable configuration, releases embody this safety; consultants consider exploitation stays possible with extra effort.

The vulnerability notably impacts the mllama mannequin parsing code written in C++, the place unsafe reminiscence operations happen throughout mannequin initialization.

The Ollama growth workforce addressed this vulnerability in model 0.7.0 by utterly rewriting the susceptible mllama mannequin dealing with code in Go, eliminating the unsafe C++ implementation.

Customers operating older variations face vital safety dangers and will improve to the most recent launch instantly.

Organizations utilizing Ollama in manufacturing environments ought to audit their deployments and implement model controls to forestall the loading of untrusted mannequin recordsdata.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Arbitrary, Attackers, Code, Execute, Files, Malicious, Model, Ollama, Parsing, Vulnerabilities

Post navigation

Previous Post: Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
Next Post: Recent 7-Zip Vulnerability Exploited in Attacks

Related Posts

ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration Cyber Security News
Attackers Can Exploit WerFaultSecure.exe Tool to Steal Cached Passwords From Windows 11 24H2 Cyber Security News
Lesson From Cisco ASA 0-Day RCE Vulnerability That Actively Exploited In The Wild Cyber Security News
New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands Cyber Security News
Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks Cyber Security News
OpenAI Launches $4 ChatGPT Go Plan with Unlimited Access to GPT-5 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums
  • Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication
  • Recent 7-Zip Vulnerability Exploited in Attacks
  • Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files
  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums
  • Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication
  • Recent 7-Zip Vulnerability Exploited in Attacks
  • Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files
  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News