{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T04:33:32.580","vulnerabilities":[{"cve":{"id":"CVE-2025-15514","sourceIdentifier":"disclosure@vulncheck.com","published":"2026-01-12T23:15:51.957","lastModified":"2026-01-21T17:52:04.980","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Ollama 0.11.5-rc0 through current version 0.13.5 contain a null pointer dereference vulnerability in the multi-modal model image processing functionality. When processing base64-encoded image data via the /api/chat endpoint, the application fails to validate that the decoded data represents valid media before passing it to the mtmd_helper_bitmap_init_from_buf function. This function can return NULL for malformed input, but the code does not check this return value before dereferencing the pointer in subsequent operations. A remote attacker can exploit this by sending specially crafted base64 image data that decodes to invalid media, causing a segmentation fault and crashing the runner process. This results in a denial of service condition where the model becomes unavailable to all users until the service is restarted."},{"lang":"es","value":"Ollama 0.11.5-rc0 hasta la versión actual 0.13.5 contienen una vulnerabilidad de desreferencia de puntero nulo en la funcionalidad de procesamiento de imágenes del modelo multimodal. Al procesar datos de imagen codificados en base64 a través del endpoint /api/chat, la aplicación no valida que los datos decodificados representen medios válidos antes de pasarlos a la función mtmd_helper_bitmap_init_from_buf. Esta función puede devolver NULL para entradas malformadas, pero el código no verifica este valor de retorno antes de desreferenciar el puntero en operaciones posteriores. Un atacante remoto puede explotar esto enviando datos de imagen base64 especialmente diseñados que se decodifican a medios no válidos, causando un fallo de segmentación y bloqueando el proceso del ejecutor. Esto resulta en una condición de denegación de servicio donde el modelo deja de estar disponible para todos los usuarios hasta que se reinicie el servicio."}],"metrics":{"cvssMetricV40":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Primary","description":[{"lang":"en","value":"CWE-395"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ollama:ollama:*:-:*:*:*:*:*:*","versionStartIncluding":"0.11.6","versionEndIncluding":"0.13.5","matchCriteriaId":"A2EB10B7-A5EB-4B01-A591-C27DEA897FF6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ollama:ollama:0.11.5:-:*:*:*:*:*:*","matchCriteriaId":"AC72C651-C41F-4C69-BADF-9C0F2E722F20"},{"vulnerable":true,"criteria":"cpe:2.3:a:ollama:ollama:0.11.5:rc0:*:*:*:*:*:*","matchCriteriaId":"7B2DAD56-4180-4D74-ABAE-34946D2619D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:ollama:ollama:0.11.5:rc1:*:*:*:*:*:*","matchCriteriaId":"723E4B33-FCAB-4052-B83F-E8CA13B0C6C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ollama:ollama:0.11.5:rc2:*:*:*:*:*:*","matchCriteriaId":"073B24E6-AD43-4186-A4F7-1CC95F93F47B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ollama:ollama:0.11.5:rc3:*:*:*:*:*:*","matchCriteriaId":"6194878B-E3B9-43C5-8B3F-37F423A720EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ollama:ollama:0.11.5:rc4:*:*:*:*:*:*","matchCriteriaId":"3D7F97D1-1C4A-4F41-BBB9-D147E8B3CFE1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ollama:ollama:0.11.5:rc5:*:*:*:*:*:*","matchCriteriaId":"686D5C2C-42B1-4C97-9497-3EF9020B9B83"}]}]}],"references":[{"url":"https://https://github.com/ollama/ollama","source":"disclosure@vulncheck.com","tags":["Product"]},{"url":"https://huntr.com/bounties/172df98b-07cd-41ea-a628-366f8cd525c0","source":"disclosure@vulncheck.com","tags":["Exploit","Patch","Third Party Advisory"]},{"url":"https://ollama.com/","source":"disclosure@vulncheck.com","tags":["Product"]},{"url":"https://www.vulncheck.com/advisories/ollama-multi-modal-image-processing-null-pointer-dereference","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]}]}}]}