MacSSH Information for VU#997481
Cryptographic libraries and applications do not adequately defend against timing attacks
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
MacSSH is based on lsh. lsh only implements SSH version 2. SSH 2 is not vulnerable to this attack since the attacker cannot adequately control input to the RSA signing operation.
If you have feedback, comments, or additional information about this vulnerability, please send us email.