hugo/content/about/security/advisories/cve-2004-0500-00.md

Fri, 28 Feb 2025 00:58:39 -0600

author
Gary Kramlich <grim@reaperworld.com>
date
Fri, 28 Feb 2025 00:58:39 -0600
changeset 547
8400662befb3
parent 394
c83367e9b2db
permissions
-rw-r--r--

Add the Meshtastic plugin

I meant to add this awhile ago but somehow missed it.

Testing Done:
Ran `npm run hugo:server` and verified the plugin showed up.

Reviewed at https://reviews.imfreedom.org/r/3861/

---
title: cve-2004-0500-00
date: 2004-08-22T00:00:00.000Z
cveNumber: cve-2004-0500
summary: MSN strncpy buffer overflow
discoveredBy: Sebastian Krahmer, SUSE Security Team
fixedInRelease: 0.82
type: security
layout: cve
hidden: true
---

### Description

In two places in the MSN protocol plugins (`object.c` and `slp.c`), `strncpy`
was used incorrectly.  The size of the array was not checked before copying to
it.  Both bugs affect MSN's MSNSLP protocol, which is peer-to-peer, so this
could potentially be easy to exploit.

### Mitigation

Bounds checking was added in both places.

mercurial