Intoto Information for VU#997481
Cryptographic libraries and applications do not adequately defend against timing attacks
Intoto analyzed its iGateway Ver 3.2 implementation for the RSA timing attack documented in VU#997481, and found it vulnerable.
Patch for this vulnerability can be obtained by contacting Intoto at firstname.lastname@example.org.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.