Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files

Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files

Posted on November 20, 2025November 20, 2025 By CWS

A extreme vulnerability in Ollama, considered one of GitHub’s hottest open-source tasks, with over 155,000 stars. The flaw allows attackers to execute arbitrary code on methods operating susceptible variations of the platform by exploiting weaknesses within the software program’s parsing of mannequin recordsdata.

Ollama is a extensively used software that enables builders and AI specialists to run giant language fashions domestically with out counting on exterior providers like OpenAI.

The platform helps quite a few open-source fashions, together with gpt-oss, DeepSeek-R1, Meta’s Llama4, and Google’s Gemma3.

client-server structure of Ollama

Sonarsource researchers discovered a vital Out-Of-Bounds Write vulnerability throughout safety auditing of Ollama’s codebase.

The vulnerability impacts all Ollama variations earlier than 0.7.0 and exists within the mannequin file parsing mechanism. When processing specifically crafted GGUF mannequin recordsdata, the software program fails to validate particular metadata values correctly.

Particularly, in the course of the parsing of mllama fashions, the code doesn’t confirm whether or not indices specified within the mannequin’s metadata fall inside acceptable bounds. This oversight permits attackers to govern reminiscence past allotted boundaries.

The exploitation path includes creating malicious mannequin recordsdata with outsized metadata entries or invalid layer indices. When Ollama processes these recordsdata, the vulnerability triggers an Out-Of-Bounds Write situation.

mannequin file to substantiate OOB write

Attackers who achieve entry to Ollama’s API can load and execute these weaponized fashions, reaching distant code execution on the goal system.

Sonarsource confirmed the vulnerability is exploitable in builds with out Place Impartial Executable configuration, releases embody this safety; consultants consider exploitation stays possible with extra effort.

The vulnerability notably impacts the mllama mannequin parsing code written in C++, the place unsafe reminiscence operations happen throughout mannequin initialization.

The Ollama growth workforce addressed this vulnerability in model 0.7.0 by utterly rewriting the susceptible mllama mannequin dealing with code in Go, eliminating the unsafe C++ implementation.

Customers operating older variations face vital safety dangers and will improve to the most recent launch instantly.

Organizations utilizing Ollama in manufacturing environments ought to audit their deployments and implement model controls to forestall the loading of untrusted mannequin recordsdata.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Arbitrary, Attackers, Code, Execute, Files, Malicious, Model, Ollama, Parsing, Vulnerabilities

Post navigation

Previous Post: Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
Next Post: Recent 7-Zip Vulnerability Exploited in Attacks

Related Posts

Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Cyber Security News
Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft Cyber Security News
Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors  Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors  Cyber Security News
Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details Cyber Security News
New DPRK Interview Campaign Leverages Fake Fonts to Deploy Malware New DPRK Interview Campaign Leverages Fake Fonts to Deploy Malware Cyber Security News
Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark