{"id":10009,"date":"2021-09-09T13:59:13","date_gmt":"2021-09-09T10:59:13","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10009"},"modified":"2021-09-09T13:59:13","modified_gmt":"2021-09-09T10:59:13","slug":"cve-2021-40444-vulnerability-mshtml","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/cve-2021-40444-vulnerability-mshtml\/10009\/","title":{"rendered":"Internet Explorer&#8217;daki g\u00fcvenlik a\u00e7\u0131\u011f\u0131 Microsoft Office kullan\u0131c\u0131lar\u0131n\u0131 tehdit ediyor"},"content":{"rendered":"<p>Microsoft, CVE-2021-40444 kodlu, kurbanlar\u0131n bilgisayar\u0131nda <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/remote-code-execution-rce\/\" target=\"_blank\" rel=\"noopener\">uzaktan k\u00f6t\u00fc ama\u00e7l\u0131 kod y\u00fcr\u00fct\u00fclmesine<\/a> izin veren bir s\u0131f\u0131r g\u00fcn (zero-day) g\u00fcvenlik a\u00e7\u0131\u011f\u0131 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\" target=\"_blank\" rel=\"noopener nofollow\">bildirdi<\/a>. Daha da k\u00f6t\u00fcs\u00fc, siber su\u00e7lular halen Microsoft Office kullan\u0131c\u0131lar\u0131na sald\u0131rmak i\u00e7in bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kullan\u0131yor. Bu nedenle Microsoft, Windows a\u011f y\u00f6neticilerine, \u015firket bir yama yay\u0131nlayana kadar ge\u00e7ici bir \u00e7\u00f6z\u00fcm kullanmalar\u0131n\u0131 tavsiye ediyor.<\/p>\n<h2>CVE-2021-40444\u2019\u00fcn ayr\u0131nt\u0131lar\u0131<\/h2>\n<p>G\u00fcvenlik a\u00e7\u0131\u011f\u0131, Internet Explorer\u2019\u0131n MSHTML motorunda bulunuyor. Her ne kadar art\u0131k bug\u00fcn \u00e7ok az say\u0131da ki\u015fi IE kullan\u0131yor olsa da (Microsoft bile \u015fiddetle \u015firketin yeni taray\u0131c\u0131s\u0131 Edge\u2019e ge\u00e7ilmesini tavsiye ediyor), eski taray\u0131c\u0131 modern i\u015fletim sistemlerinin bir bile\u015feni olmaya devam ediyor ve di\u011fer baz\u0131 programlar Web i\u00e7eri\u011fini i\u015fleme konusunda IE\u2019nin motorunu kullan\u0131yorlar. \u00d6zellikle, Word ve PowerPoint gibi Microsoft Office uygulamalar\u0131 buna dayan\u0131yor.<\/p>\n<h2>Sald\u0131rganlar CVE-2021-40444 a\u00e7\u0131\u011f\u0131ndan nas\u0131l faydalan\u0131yor?<\/h2>\n<p>Sald\u0131r\u0131lar, Microsoft Office belgelerine g\u00f6m\u00fcl\u00fc k\u00f6t\u00fc ama\u00e7l\u0131 ActiveX denetimleri gibi g\u00f6r\u00fcn\u00fcyor. Denetimler, iste\u011fe ba\u011fl\u0131 kod y\u00fcr\u00fct\u00fclmesini sa\u011fl\u0131yor; belgeler b\u00fcy\u00fck olas\u0131l\u0131kla e-posta ekleri olarak geliyor.<\/p>\n<p>Ek yap\u0131lan her belgede oldu\u011fu gibi, sald\u0131rganlar\u0131n kurbanlar\u0131 \u2013 \u00f6zellikle y\u00f6netici ayr\u0131cal\u0131klar\u0131na sahip kullan\u0131c\u0131lar\u0131 \u2013 dosyay\u0131 a\u00e7maya ikna etmesi gerekiyor.<\/p>\n<p>Teoride Microsoft Office, internetten indirilen belgeleri Korumal\u0131 G\u00f6r\u00fcn\u00fcm\u2019de veya Office i\u00e7in Uygulama Korumas\u0131 arac\u0131l\u0131\u011f\u0131yla a\u00e7ar ve bu y\u00f6ntemlerden herhangi biri bir CVE-2021-40444 sald\u0131r\u0131s\u0131n\u0131 \u00f6nleyebilir. Ancak kullan\u0131c\u0131lar, d\u00fc\u015f\u00fcnmeden D\u00fczenlemeyi Etkinle\u015ftir d\u00fc\u011fmesini t\u0131klayarak Microsoft\u2019un g\u00fcvenlik mekanizmalar\u0131n\u0131 devre d\u0131\u015f\u0131 b\u0131rakabiliyor.<\/p>\n<div id=\"attachment_10011\" style=\"width: 875px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10011\" class=\"wp-image-10011 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/09\/09134658\/CVE-2021-40444-vulnerability-mshtml-notification.png\" alt=\"\" width=\"865\" height=\"35\"><p id=\"caption-attachment-10011\" class=\"wp-caption-text\">Microsoft Word\u2019deki Korumal\u0131 G\u00f6r\u00fcn\u00fcm modu bildirimi<\/p><\/div>\n<h2>\u015eirketinizi CVE-2021-40444\u2019ten nas\u0131l korursunuz?<\/h2>\n<p>Microsoft, konuyu ara\u015ft\u0131raca\u011f\u0131na ve gerekmesi halinde resmi bir yama yay\u0131nlayaca\u011f\u0131na ili\u015fkin taahh\u00fctte bulundu. Bununla birlikte, bir sonraki Sal\u0131 Yamas\u0131 tarihi olan 14 Eyl\u00fcl\u2019den \u00f6nce bir yama yay\u0131nlanmas\u0131n\u0131 beklemiyoruz. Normal \u015fartlarda \u015firket, d\u00fczeltmesini yay\u0131nlamadan \u00f6nce bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 duyurmuyor ancak siber su\u00e7lular zaten CVE-2021-40444 g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan faydaland\u0131\u011f\u0131 i\u00e7in, Microsoft derhal ge\u00e7ici bir \u00e7\u00f6z\u00fcm kullan\u0131lmas\u0131n\u0131 \u00f6neriyor.<\/p>\n<p>Bu ge\u00e7ici \u00e7\u00f6z\u00fcm, sistem kay\u0131t defterine birka\u00e7 anahtar ekleyerek yapabilece\u011finiz yeni ActiveX denetimlerinin y\u00fcklenmesini yasaklamay\u0131 i\u00e7eriyor. Microsoft, bir Ge\u00e7ici \u00c7\u00f6z\u00fcmler b\u00f6l\u00fcm\u00fc de dahil olmak \u00fczere (bu b\u00f6l\u00fcmden, art\u0131k ihtiyac\u0131n\u0131z kalmad\u0131\u011f\u0131nda ge\u00e7ici \u00e7\u00f6z\u00fcm\u00fc nas\u0131l devre d\u0131\u015f\u0131 b\u0131rakaca\u011f\u0131n\u0131z\u0131 da \u00f6\u011frenebilirsiniz) <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\" target=\"_blank\" rel=\"noopener nofollow\">g\u00fcvenlik a\u00e7\u0131\u011f\u0131 hakk\u0131nda ayr\u0131nt\u0131l\u0131 bilgi<\/a> sunuyor. Microsoft\u2019a g\u00f6re ge\u00e7ici \u00e7\u00f6z\u00fcm, halihaz\u0131rda y\u00fckl\u00fc olan ActiveX denetimlerinin performans\u0131n\u0131 etkilemiyor.<\/p>\n<p>Kendi a\u00e7\u0131m\u0131zdan:<\/p>\n<ul>\n<li>Kurumsal e-posta hizmetini sald\u0131r\u0131lara kar\u015f\u0131 korumak i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/mail-server?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">kurumsal e-posta a\u011f ge\u00e7idi d\u00fczeyinde bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc y\u00fcklenmesini<\/a> veya <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/microsoft-office-365-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kso365___\" target=\"_blank\" rel=\"noopener\">Microsoft Office 365'in standart g\u00fcvenlik mekanizmalar\u0131n\u0131n g\u00fc\u00e7lendirilmesini<\/a>,<\/li>\n<li>T\u00fcm \u00e7al\u0131\u015fan bilgisayarlar\u0131n\u0131n, g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanmay\u0131 tespit edebilen <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">g\u00fcvenlik \u00e7\u00f6z\u00fcmleri<\/a> ile donat\u0131lmas\u0131n\u0131,<\/li>\n<li>Modern siber tehditlere kar\u015f\u0131 <a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">\u00e7al\u0131\u015fanlar\u0131n fark\u0131ndal\u0131\u011f\u0131n\u0131n<\/a> d\u00fczenli olarak art\u0131r\u0131lmas\u0131n\u0131 ve zorunda kal\u0131nmad\u0131k\u00e7a d\u00fczenleme modunun a\u00e7\u0131lmas\u0131 bir yana g\u00fcvenilmeyen kaynaklardan gelen belgeleri asla a\u00e7mamalar\u0131 konusunun \u00f6zellikle hat\u0131rlat\u0131lmas\u0131n\u0131 \u00f6neriyoruz.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MSHTML motorundaki yama uygulanmam\u0131\u015f bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131, Microsoft Office kullan\u0131c\u0131lar\u0131n\u0131 hedef alan sald\u0131r\u0131lar ger\u00e7ekle\u015ftirilmesini sa\u011fl\u0131yor.<\/p>\n","protected":false},"author":2581,"featured_media":10010,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2471,790,1987,38,1912],"class_list":{"0":"post-10009","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-activex","10":"tag-guvenlik-aciklari","11":"tag-internet-explorer","12":"tag-microsoft","13":"tag-office"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cve-2021-40444-vulnerability-mshtml\/10009\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cve-2021-40444-vulnerability-mshtml\/23260\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cve-2021-40444-vulnerability-mshtml\/18747\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/cve-2021-40444-vulnerability-mshtml\/9380\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cve-2021-40444-vulnerability-mshtml\/25324\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cve-2021-40444-vulnerability-mshtml\/23393\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cve-2021-40444-vulnerability-mshtml\/22785\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cve-2021-40444-vulnerability-mshtml\/25950\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cve-2021-40444-vulnerability-mshtml\/25487\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cve-2021-40444-vulnerability-mshtml\/31439\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cve-2021-40444-vulnerability-mshtml\/41728\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cve-2021-40444-vulnerability-mshtml\/17575\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cve-2021-40444-vulnerability-mshtml\/18077\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cve-2021-40444-vulnerability-mshtml\/15213\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cve-2021-40444-vulnerability-mshtml\/27287\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/cve-2021-40444-vulnerability-mshtml\/27506\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cve-2021-40444-vulnerability-mshtml\/24309\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cve-2021-40444-vulnerability-mshtml\/29645\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cve-2021-40444-vulnerability-mshtml\/29439\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guvenlik-aciklari\/","name":"g\u00fcvenlik a\u00e7\u0131klar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10009"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10009\/revisions"}],"predecessor-version":[{"id":10012,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10009\/revisions\/10012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10010"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}