### [CVE-2024-39720](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39720) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in Ollama before 0.1.46. An attacker can use two HTTP requests to upload a malformed GGUF file containing just 4 bytes starting with the GGUF custom magic header. By leveraging a custom Modelfile that includes a FROM statement pointing to the attacker-controlled blob file, the attacker can crash the application through the CreateModel route, leading to a segmentation fault (signal SIGSEGV: segmentation violation). ### POC #### Reference - https://oligo.security/blog/more-models-more-probllms #### Github - https://github.com/datawhalechina/handy-ollama - https://github.com/wowtalon/LLM-Security