{"id":5307,"date":"2018-10-10T21:19:26","date_gmt":"2018-10-10T18:19:26","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5307"},"modified":"2022-05-05T14:25:51","modified_gmt":"2022-05-05T11:25:51","slug":"vulnerability-in-windows-patched","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/vulnerability-in-windows-patched\/5307\/","title":{"rendered":"Windows&#8217;ta teknolojilerimiz taraf\u0131ndan yakalanan s\u0131f\u0131r g\u00fcn a\u00e7\u0131\u011f\u0131"},"content":{"rendered":"<p>Genellikle g\u00fcvenlik \u00e7\u00f6z\u00fcmlerine, yeni g\u00fcvenlik a\u00e7\u0131klar\u0131yla ilgili bilgi verilmesi gerekirken bazen Kaspersky Lab teknolojileri bizi yeni s\u0131f\u0131r g\u00fcn a\u00e7\u0131klar\u0131yla ilgili bilgilendirir. Bu makalenin konusu da bu t\u00fcr durumlara ili\u015fkin bir \u00f6rnektir. Otomatik G\u00fcvenlik A\u00e7\u0131klar\u0131n\u0131 \u00d6nleme teknolojimiz, yak\u0131n zaman \u00f6nce yeni bir siber sald\u0131r\u0131 t\u00fcr\u00fcn\u00fc tespit etti. Bu sald\u0131r\u0131, hen\u00fcz ke\u015ffedilmemi\u015f bir i\u015fletim sistemi g\u00fcvenlik a\u00e7\u0131\u011f\u0131 \u00fczerindeki daha \u00f6nce bilinmeyen bir a\u00e7\u0131ktan yararlanmaya \u00e7al\u0131\u015f\u0131yordu.<\/p>\n<p>Vakay\u0131 inceleyen uzmanlar\u0131m\u0131z, g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n Win32 S\u00fcr\u00fcc\u00fc dosyas\u0131 olan win32k.sys dosyas\u0131nda bulundu\u011funu fark etti. Microsoft uzmanlar\u0131n\u0131n, h\u0131zl\u0131ca bir g\u00fcvenlik yamas\u0131 olu\u015fturabilmesi i\u00e7in uzmanlar\u0131m\u0131z, konuyu derhal Microsoft\u2019a bildirdi. Microsoft, 9 Ekim tarihinde g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n varl\u0131\u011f\u0131n\u0131 a\u00e7\u0131klad\u0131 ve ba\u015fka \u00f6zelliklerin yan\u0131 s\u0131ra CVE-2018-8453 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 onaran bir g\u00fcncelleme yay\u0131nlad\u0131.<\/p>\n<h2>G\u00fcvenlik a\u00e7\u0131\u011f\u0131 ne kadar tehlikeliydi?<\/h2>\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, ma\u011fdurun bilgisayar\u0131nda kal\u0131c\u0131l\u0131k sa\u011flamak amac\u0131yla yeterli ayr\u0131cal\u0131k elde etmek i\u00e7in bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlan\u0131yordu. Dolay\u0131s\u0131yla bilgisayar\u0131n\u0131z\u0131n kontrol\u00fcn\u00fc sald\u0131rganlar\u0131n eline verebilen bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ciddi bir potansiyele sahip. Uzmanlar\u0131m\u0131za g\u00f6re bu yaz\u0131l\u0131mlar, MS Windows 10 RS4 dahil olmak \u00fczere m\u00fcmk\u00fcn oldu\u011fu kadar \u00e7ok say\u0131da farkl\u0131 MS Windows yap\u0131s\u0131n\u0131 hedef al\u0131yor.<\/p>\n<p>\u00c7\u00f6z\u00fcmlerimiz, bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kullanan birden \u00e7ok sald\u0131r\u0131y\u0131 tespit etti. Ma\u011fdurlar\u0131n \u00e7o\u011fu, Orta Do\u011fu b\u00f6lgesinde yer al\u0131yordu. Uzmanlar\u0131m\u0131z, bunun kesinlikle hedefli bir sald\u0131r\u0131 oldu\u011funa inan\u0131yor. Ancak g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n a\u00e7\u0131klanmas\u0131ndan sonra bu t\u00fcr vakalar\u0131n say\u0131s\u0131 artabilir.<\/p>\n<p>Sald\u0131r\u0131n\u0131n teknik ayr\u0131nt\u0131lar\u0131yla ilgili daha fazla bilgiyi <a href=\"https:\/\/securelist.com\/cve-2018-8453-used-in-targeted-attacks\/88151\/\" target=\"_blank\" rel=\"noopener\">bu Securelist g\u00f6nderisinde bulabilirsiniz<\/a>.<\/p>\n<h2>G\u00fcvenli\u011finizi nas\u0131l sa\u011flayabilirsiniz?<\/h2>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Vakit kaybetmeden, Microsoft\u2019un d\u00fczeltme g\u00fcncellemesini y\u00fckleyin. D\u00fczeltme g\u00fcncellemesini <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/eula\" target=\"_blank\" rel=\"noopener nofollow\">burada bulabilirsiniz<\/a>.<\/li>\n<li>\u015eirketinizde kullan\u0131lan yaz\u0131l\u0131m\u0131 d\u00fczenli olarak en yeni s\u00fcr\u00fcmlere g\u00fcncelleyin.<\/li>\n<li>G\u00fcncelleme s\u00fcre\u00e7lerini otomatik hale getirmek i\u00e7in g\u00fcvenlik a\u00e7\u0131\u011f\u0131 de\u011ferlendirme ve d\u00fczeltme eki y\u00f6netimi \u00f6zelliklerine sahip g\u00fcvenlik \u00fcr\u00fcnlerini kullan\u0131n.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>S\u0131f\u0131r g\u00fcn a\u00e7\u0131klar\u0131ndan yararlanan yaz\u0131l\u0131mlar dahil olmak \u00fczere bilinmeyen tehditlere kar\u015f\u0131 etkili koruma i\u00e7in davran\u0131\u015f tabanl\u0131 tespit \u00f6zelliklerine sahip dayan\u0131kl\u0131 g\u00fcvenlik \u00e7\u00f6z\u00fcmlerini kullan\u0131n.<br>\nTeknolojilerimizin bir\u00e7o\u011fu, s\u0131f\u0131r g\u00fcn a\u00e7\u0131\u011f\u0131ndan yararlanan bu yaz\u0131l\u0131mlar\u0131 tespit edebilir. Bu teknolojilerden ilki, Kaspersky Anti Targeted Attack Platform (\u00f6zel olarak APT tehditlerine kar\u015f\u0131 koruma sa\u011flamak i\u00e7in geli\u015ftirilmi\u015f bir \u00e7\u00f6z\u00fcm) i\u00e7in Geli\u015fmi\u015f Korumal\u0131 Alan teknolojisi ve K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131mlara Kar\u015f\u0131 Koruma motorumuzdur. \u0130kincisi ise Kaspersky Endpoint Security for Business \u00e7\u00f6z\u00fcm\u00fcm\u00fcz\u00fcn i\u00e7inde yer alan bir alt sistem olan Otomatik G\u00fcvenlik A\u00e7\u0131\u011f\u0131 \u00d6nleme teknolojimizdir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\">\n","protected":false},"excerpt":{"rendered":"<p>Genellikle g\u00fcvenlik \u00e7\u00f6z\u00fcmlerine, yeni g\u00fcvenlik a\u00e7\u0131klar\u0131yla ilgili bilgi verilmesi gerekirken bazen Kaspersky Lab teknolojileri bizi yeni s\u0131f\u0131r g\u00fcn a\u00e7\u0131klar\u0131yla ilgili bilgilendirir. Bu makalenin konusu da bu t\u00fcr durumlara ili\u015fkin bir \u00f6rnektir. <\/p>\n","protected":false},"author":2706,"featured_media":5308,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[1737,1630,1122,1226,113],"class_list":{"0":"post-5307","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-cve","11":"tag-endpoint","12":"tag-exploit","13":"tag-sistem-acigi","14":"tag-windows"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/vulnerability-in-windows-patched\/5307\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/vulnerability-in-windows-patched\/14426\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/vulnerability-in-windows-patched\/12069\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/vulnerability-in-windows-patched\/16363\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/vulnerability-in-windows-patched\/14555\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/vulnerability-in-windows-patched\/13518\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/vulnerability-in-windows-patched\/17123\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/vulnerability-in-windows-patched\/16422\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/vulnerability-in-windows-patched\/21510\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/vulnerability-in-windows-patched\/24169\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/vulnerability-in-windows-patched\/11036\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/vulnerability-in-windows-patched\/10915\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/vulnerability-in-windows-patched\/9851\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/vulnerability-in-windows-patched\/17886\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/vulnerability-in-windows-patched\/21772\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/vulnerability-in-windows-patched\/17499\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/vulnerability-in-windows-patched\/21306\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/vulnerability-in-windows-patched\/21313\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/sistem-acigi\/","name":"sistem a\u00e7\u0131\u011f\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5307"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5307\/revisions"}],"predecessor-version":[{"id":6896,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5307\/revisions\/6896"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5308"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}