CentOS 6 : mesa (CESA-2013:0897)

medium Nessus Plugin ID 66775

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated mesa packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

Mesa provides a 3D graphics API that is compatible with Open Graphics Library (OpenGL). It also provides hardware-accelerated drivers for many popular graphics chips.

An out-of-bounds access flaw was found in Mesa. If an application using Mesa exposed the Mesa API to untrusted inputs (Mozilla Firefox does this), an attacker could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2013-1872)

It was found that Mesa did not correctly validate messages from the X server. A malicious X server could cause an application using Mesa to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2013-1993)

All users of Mesa are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running applications linked against Mesa must be restarted for this update to take effect.

Solution

Update the affected mesa packages.

See Also

http://www.nessus.org/u?0000f198

Plugin Details

Severity: Medium

ID: 66775

File Name: centos_RHSA-2013-0897.nasl

Version: 1.11

Type: local

Agent: unix

Published: 6/4/2013

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2013-1872

Vulnerability Information

CPE: p-cpe:/a:centos:centos:mesa-libglu, p-cpe:/a:centos:centos:mesa-libosmesa-devel, cpe:/o:centos:centos:6, p-cpe:/a:centos:centos:mesa-libosmesa, p-cpe:/a:centos:centos:mesa-demos, p-cpe:/a:centos:centos:mesa-libglu-devel, p-cpe:/a:centos:centos:glx-utils, p-cpe:/a:centos:centos:mesa-libgl-devel, p-cpe:/a:centos:centos:mesa-dri-drivers, p-cpe:/a:centos:centos:mesa-dri-filesystem, p-cpe:/a:centos:centos:mesa-libgl

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 6/3/2013

Vulnerability Publication Date: 6/15/2013

Reference Information

CVE: CVE-2013-1872, CVE-2013-1993

BID: 60149, 60285

RHSA: 2013:0897