Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files

Posted on November 20, 2025November 20, 2025 By CWS

A extreme vulnerability in Ollama, considered one of GitHub’s hottest open-source tasks, with over 155,000 stars. The flaw allows attackers to execute arbitrary code on methods operating susceptible variations of the platform by exploiting weaknesses within the software program’s parsing of mannequin recordsdata.

Ollama is a extensively used software that enables builders and AI specialists to run giant language fashions domestically with out counting on exterior providers like OpenAI.

The platform helps quite a few open-source fashions, together with gpt-oss, DeepSeek-R1, Meta’s Llama4, and Google’s Gemma3.

client-server structure of Ollama

Sonarsource researchers discovered a vital Out-Of-Bounds Write vulnerability throughout safety auditing of Ollama’s codebase.

The vulnerability impacts all Ollama variations earlier than 0.7.0 and exists within the mannequin file parsing mechanism. When processing specifically crafted GGUF mannequin recordsdata, the software program fails to validate particular metadata values correctly.

Particularly, in the course of the parsing of mllama fashions, the code doesn’t confirm whether or not indices specified within the mannequin’s metadata fall inside acceptable bounds. This oversight permits attackers to govern reminiscence past allotted boundaries.

The exploitation path includes creating malicious mannequin recordsdata with outsized metadata entries or invalid layer indices. When Ollama processes these recordsdata, the vulnerability triggers an Out-Of-Bounds Write situation.

mannequin file to substantiate OOB write

Attackers who achieve entry to Ollama’s API can load and execute these weaponized fashions, reaching distant code execution on the goal system.

Sonarsource confirmed the vulnerability is exploitable in builds with out Place Impartial Executable configuration, releases embody this safety; consultants consider exploitation stays possible with extra effort.

The vulnerability notably impacts the mllama mannequin parsing code written in C++, the place unsafe reminiscence operations happen throughout mannequin initialization.

The Ollama growth workforce addressed this vulnerability in model 0.7.0 by utterly rewriting the susceptible mllama mannequin dealing with code in Go, eliminating the unsafe C++ implementation.

Customers operating older variations face vital safety dangers and will improve to the most recent launch instantly.

Organizations utilizing Ollama in manufacturing environments ought to audit their deployments and implement model controls to forestall the loading of untrusted mannequin recordsdata.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Arbitrary, Attackers, Code, Execute, Files, Malicious, Model, Ollama, Parsing, Vulnerabilities

Post navigation

Previous Post: Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
Next Post: Recent 7-Zip Vulnerability Exploited in Attacks

Related Posts

Microsoft Confirms Windows 11 25H2 UI Features Broken Along With 24H2 Following Update Cyber Security News
American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign Cyber Security News
New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials Cyber Security News
Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack Cyber Security News
Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory Cyber Security News
Encrypting Data to Meet Global Privacy Law Requirements Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark