Ollama 0.11.5-rc0 through current version 0.13.5 contain a null pointer dereference vulnerability in the multi-modal model image processing functionality. When processing base64-encoded image data via the /api/chat endpoint, the application fails to validate that the decoded data represents valid media before passing it to the mtmd_helper_bitmap_init_from_buf function. This function can return NULL for malformed input, but the code does not check this return value before dereferencing the pointer in subsequent operations. A remote attacker can exploit this by sending specially crafted base64 image data that decodes to invalid media, causing a segmentation fault and crashing the runner process. This results in a denial of service condition where the model becomes unavailable to all users until the service is restarted.
References
| Link | Resource |
|---|---|
| https://https://github.com/ollama/ollama | Product |
| https://huntr.com/bounties/172df98b-07cd-41ea-a628-366f8cd525c0 | Exploit Patch Third Party Advisory |
| https://ollama.com/ | Product |
| https://www.vulncheck.com/advisories/ollama-multi-modal-image-processing-null-pointer-dereference | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-01-12 23:15
Updated : 2026-01-21 17:52
NVD link : CVE-2025-15514
Mitre link : CVE-2025-15514
CVE.ORG link : CVE-2025-15514
JSON object : View
Products Affected
ollama
- ollama
CWE
CWE-395
Use of NullPointerException Catch to Detect NULL Pointer Dereference
