XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes.

A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.

Project Subscriptions

Vendors Products
Xml::parser Subscribe
Advisories

No advisories yet.

Fixes

Solution

Apply the patch that has been publicly available since 2006-06-13 or upgrade to version 2.46 or later.


Workaround

Apply the patch that has been publicly available since 2006-06-13.

History

Mon, 23 Mar 2026 01:45:00 +0000

Type Values Removed Values Added
References

Sat, 21 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes. A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes. XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes. A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.
Title XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes
References

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Toddr xml::parser
Vendors & Products Toddr xml::parser

Fri, 20 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-131
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 19 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Toddr
Toddr xml\
CPEs cpe:2.3:a:toddr:xml\:\:parser:*:*:*:*:*:perl:*:*
Vendors & Products Toddr
Toddr xml\

Thu, 19 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
References

Thu, 19 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 11:30:00 +0000

Type Values Removed Values Added
Description XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes. A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.
Title XML::Parser versions through 2.47 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes
Weaknesses CWE-122
CWE-176
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-03-22T23:06:42.361Z

Reserved: 2026-03-16T22:47:45.685Z

Link: CVE-2006-10002

cve-icon Vulnrichment

Updated: 2026-03-22T23:06:42.361Z

cve-icon NVD

Status : Modified

Published: 2026-03-19T12:16:16.120

Modified: 2026-03-23T00:16:47.833

Link: CVE-2006-10002

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-19T11:03:46Z

Links: CVE-2006-10002 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:15:07Z

Weaknesses