CandyCaine's picture
Rename HUGGINGFACE_README.md to README.md
1ed2c66 verified
metadata
license: mit
library_name: gguf
tags:
  - security
  - poc
  - vulnerability

PoC: GGUF Integer Overflow Vulnerability

This repository contains a Proof-of-Concept (PoC) model file (gguf_overflow.gguf) demonstrating a critical Integer Overflow vulnerability in standard GGUF parsers (like llama.cpp/ggml).

Vulnerability Details

The GGUF format allows defining tensor dimensions. If a tensor is defined with dimensions that fit within a 64-bit element count but result in a byte size exceeding $2^{64}$ when multiplied by the data type size (e.g., Float32 = 4 bytes), the size calculation overflows module $2^{64}$.

This leads to a tiny memory allocation (e.g., 4 bytes) for a massive tensor, causing Heap Corruption when the parser attempts to read/write the tensor data.

Files

  • gguf_overflow.gguf: The malicious model file.
  • poc_gguf_overflow.py: Script used to generate the model.

Usage

WARNING: This file may crash your system or corrupt memory. Run in a sandboxed environment.

# Verify with llama.cpp
./llama-cli -m gguf_overflow.gguf