You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

YAML Metadata Warning:empty or missing yaml metadata in repo card

Check out the documentation for more information.

CoreML Span::Slice Integer Overflow PoC

This repository contains a crafted CoreML weight file (.wt) that triggers an integer overflow vulnerability in the MILBlob Span::Slice() bounds check in coremltools.

Files

  • malicious_weight.wt - Crafted weight file (256 bytes) that causes OOB read / crash

Vulnerability

The blob_metadata in the weight file contains:

  • offset = 128 (valid position)
  • sizeInBytes = 0xFFFFFFFFFFFFFF80 (UINT64_MAX - 127)

When loaded by StorageReader, Span::Slice(128, 0xFFFFFFFFFFFFFF80) is called. The bounds check 128 + 0xFFFFFFFFFFFFFF80 = 0 (overflow!) <= 256 passes, creating an 18 EB Span.

Accessing data beyond the mmap'd file region causes SIGSEGV.

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support