Apache Information for VU#997481

Cryptographic libraries and applications do not adequately defend against timing attacks

Status

Unknown. If you are the vendor named above, please contact us to update your status.

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

Apache 2.0.x relies on OpenSSL to perform SSL/TLS operations, so a patched version of OpenSSL is required to defend against this attack on Apache 2.0.x servers. Apache 1.3.x uses mod_ssl to perform SSL/TLS operations, so an updated version of mod_ssl is required to defend against this attack on Apache 1.3.x servers.

If you have feedback, comments, or additional information about this vulnerability, please send us email.