Vulnerability Description
XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack. In the case (stackptr == stacksize - 1), the stack will NOT be expanded. Then the new value will be written at location (++stackptr), which equals stacksize and therefore falls just outside the allocated buffer. The bug can be observed when parsing an XML file with very deep element nesting
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Toddr | Xml\ | < 2.48, \ |
Related Weaknesses (CWE)
References
- https://github.com/cpan-authors/XML-Parser/commit/3eb9cc95420fa0c3f76947c4708962Patch
- https://github.com/cpan-authors/XML-Parser/issues/39Issue Tracking
- https://rt.cpan.org/Ticket/Display.html?id=19860Mailing List
- http://www.openwall.com/lists/oss-security/2026/03/19/2Mailing ListPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2026/04/msg00002.html
FAQ
What is CVE-2006-10003?
CVE-2006-10003 is a vulnerability with a CVSS score of 9.8 (CRITICAL). XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack. In the case (stackptr == stacksize - 1), the stack will NOT be expanded. Then the new value will ...
How severe is CVE-2006-10003?
CVE-2006-10003 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2006-10003?
Check the references section above for vendor advisories and patch information. Affected products include: Toddr Xml\.