This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201604-02
(Xalan-Java: Arbitrary code execution)
The TransformerFactory in Apache Xalan-Java does not properly restrict
access to certain properties when FEATURE_SECURE_PROCESSING is enabled.
This can also be exploited via a Java property that is bound to the XSLT
1.0 system-property function.
A remote attacker could inject specially crafted XSLT properties
resulting in the execution of arbitrary code with the privileges of the
There is no known work around at this time.
See also :
All Xalan-Java users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-java/xalan-2.7.2'
Risk factor :
High / CVSS Base Score : 7.5