Miggo Logo

CVE-2025-1975:
Ollama Server Vulnerable to Denial of Service (DoS) Attack

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.24337%
Published
5/16/2025
Updated
5/17/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/ollama/ollamago<= 0.5.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided commit information (8c13cfa4dd35a79c983eb19b5ec2be7ffa220b69) addresses a crash related to path handling on Windows in the C++ backend. This does not align with the vulnerability description, which points to an improper array index validation in the Go-based /api/pull endpoint when processing a customized manifest. The vulnerability is described as being in version <= 0.5.11 of github.com/ollama/ollama. While the fix is likely in v0.5.12, the specific commit for this fix was not identified among the commits between v0.5.11 and v0.5.12 that were analyzed. The available information is insufficient to pinpoint the exact Go function(s) responsible for the array index out-of-bounds error within the /api/pull handler or related model download and manifest parsing logic. The files server/download.go and server/routes.go are likely candidates to contain the vulnerable code, but without the specific patch, this cannot be confirmed.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility in t** Oll*m* s*rv*r v*rsion *.*.** *llows * m*li*ious us*r to **us* * **ni*l o* S*rvi** (*oS) *tt**k *y *ustomizin* t** m*ni**st *ont*nt *n* spoo*in* * s*rvi**. T*is is *u* to improp*r v*li**tion o* *rr*y in**x ****ss w**n *ownlo**in

Reasoning

T** provi*** *ommit in*orm*tion (****************************************) ***r*ss*s * *r*s* r*l*t** to p*t* **n*lin* on Win*ows in t** *++ ***k*n*. T*is *o*s not *li*n wit* t** vuln*r**ility **s*ription, w*i** points to *n improp*r *rr*y in**x v*li*