date: 2004-08-22T00:00:00.000Z
summary: MSN strncpy buffer overflow
discoveredBy: Sebastian Krahmer, SUSE Security Team
In two places in the MSN protocol plugins (
`object.c` and
`slp.c`),
`strncpy`was used incorrectly. The size of the array was not checked before copying to
it. Both bugs affect MSN's MSNSLP protocol, which is peer-to-peer, so this
could potentially be easy to exploit.
Bounds checking was added in both places.