CVE-2006-10002

XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes. A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.
Configurations

Configuration 1 (hide)

cpe:2.3:a:toddr:xml\:\:parser:*:*:*:*:*:perl:*:*

History

23 Mar 2026, 00:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/03/22/3 -

21 Mar 2026, 12:16

Type Values Removed Values Added
References
  • {'url': 'https://github.com/cpan-authors/XML-Parser/commit/6b291f4d260fc124a6ec80382b87a918f372bc6b.patch', 'tags': ['Patch'], 'source': '9b29abf9-4ab0-4765-b253-1875cd9b441e'}
  • () https://github.com/cpan-authors/XML-Parser/commit/56b0509dfc6b559cd7555ea81ee62e3622069255.patch -
  • () https://metacpan.org/release/TODDR/XML-Parser-2.46/changes -
Summary (en) XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes. A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes. (en) XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes. A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.

19 Mar 2026, 18:41

Type Values Removed Values Added
CPE cpe:2.3:a:toddr:xml\:\:parser:*:*:*:*:*:perl:*:*
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 7.5
First Time Toddr xml\
Toddr
References () https://github.com/cpan-authors/XML-Parser/commit/6b291f4d260fc124a6ec80382b87a918f372bc6b.patch - () https://github.com/cpan-authors/XML-Parser/commit/6b291f4d260fc124a6ec80382b87a918f372bc6b.patch - Patch
References () https://github.com/cpan-authors/XML-Parser/issues/64 - () https://github.com/cpan-authors/XML-Parser/issues/64 - Issue Tracking
References () https://rt.cpan.org/Ticket/Display.html?id=19859 - () https://rt.cpan.org/Ticket/Display.html?id=19859 - Mailing List
References () http://www.openwall.com/lists/oss-security/2026/03/19/1 - () http://www.openwall.com/lists/oss-security/2026/03/19/1 - Mailing List, Patch, Third Party Advisory

19 Mar 2026, 18:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/03/19/1 -
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

19 Mar 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 12:16

Updated : 2026-03-23 00:16


NVD link : CVE-2006-10002

Mitre link : CVE-2006-10002

CVE.ORG link : CVE-2006-10002


JSON object : View

Products Affected

toddr

  • xml\
CWE
CWE-122

Heap-based Buffer Overflow

CWE-176

Improper Handling of Unicode Encoding