Ollama 0.11.5-rc0 through current version 0.13.5 contain a null pointer dereference vulnerability in the multi-modal model image processing functionality. When processing base64-encoded image data via the /api/chat endpoint, the application fails to validate that the decoded data represents valid media before passing it to the mtmdhelperbitmapinitfrom_buf function. This function can return NULL for malformed input, but the code does not check this return value before dereferencing the pointer in subsequent operations. A remote attacker can exploit this by sending specially crafted base64 image data that decodes to invalid media, causing a segmentation fault and crashing the runner process. This results in a denial of service condition where the model becomes unavailable to all users until the service is restarted.
{
"versions": [
{
"introduced": "0.11.6"
},
{
"last_affected": "0.13.5"
},
{
"introduced": "0"
},
{
"last_affected": "0.11.5-NA"
},
{
"introduced": "0"
},
{
"last_affected": "0.11.5-rc0"
},
{
"introduced": "0"
},
{
"last_affected": "0.11.5-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "0.11.5-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "0.11.5-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "0.11.5-rc4"
},
{
"introduced": "0"
},
{
"last_affected": "0.11.5-rc5"
}
]
}