MacSSH Information for VU#997481

Cryptographic libraries and applications do not adequately defend against timing attacks


Not Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



MacSSH is based on lsh. lsh only implements SSH version 2. SSH 2 is not vulnerable to this attack since the attacker cannot adequately control input to the RSA signing operation.

If you have feedback, comments, or additional information about this vulnerability, please send us email.