summary: MSN strncpy buffer overflow
discoveredBy: Sebastian Krahmer, SUSE Security Team
In two places in the MSN protocol plugins (`object.c` and `slp.c`), `strncpy`
was used incorrectly. The size of the array was not checked before copying to
it. Both bugs affect MSN's MSNSLP protocol, which is peer-to-peer, so this
could potentially be easy to exploit.
Bounds checking was added in both places.