{"id":6283,"date":"2019-08-01T10:21:37","date_gmt":"2019-08-01T07:21:37","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=6283"},"modified":"2019-11-15T14:26:07","modified_gmt":"2019-11-15T11:26:07","slug":"ios-critical-vulnerabilities-124","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ios-critical-vulnerabilities-124\/6283\/","title":{"rendered":"Hemen iOS 12.4 s\u00fcr\u00fcm\u00fcne g\u00fcncelleyin"},"content":{"rendered":"<p>iPhone\u2019unuzun ya da iPad\u2019inizin i\u015fletim sistemini yeni s\u00fcr\u00fcm \u00e7\u0131kar \u00e7\u0131kmaz g\u00fcncellemek daima iyi bir fikir: iOS\u2019un neredeyse t\u00fcm yeni s\u00fcr\u00fcmleri, \u00f6ncekilerde bulunan baz\u0131 hatalar i\u00e7in d\u00fczeltme i\u00e7eriyor. Fakat bu sefer durum daha da kritik olabilir: iOS 12.4, iMessage\u2019da yer alan, herhangi bir kullan\u0131c\u0131 etkile\u015fimine ihtiya\u00e7 duymaks\u0131z\u0131n k\u00f6t\u00fcye kullan\u0131labilen birka\u00e7 g\u00fcvenlik zafiyetini d\u00fczeltiyor.<\/p>\n<p>Bu alt\u0131 kritik g\u00fcvenlik a\u00e7\u0131\u011f\u0131, Google\u2019\u0131n Project Zero adl\u0131 hata avlama ekibinden <a href=\"https:\/\/twitter.com\/natashenka\" target=\"_blank\" rel=\"noopener nofollow\">Natalie Silvanovich<\/a> ve <a href=\"https:\/\/twitter.com\/5aelo\" target=\"_blank\" rel=\"noopener nofollow\">Samuel Gro\u00df<\/a> taraf\u0131ndan bulundu. \u015eimdilik yaln\u0131zca bu hatalar sayesinde sald\u0131rganlar\u0131n kullan\u0131c\u0131 etkile\u015fimine ihtiya\u00e7 duymadan kurbanlar\u0131n iPhone ve iPad\u2019lerinde k\u00f6t\u00fc ama\u00e7l\u0131 kodlar y\u00fcr\u00fctebildiklerini biliyoruz. Bunu yapmak i\u00e7in sald\u0131rgan\u0131n ihtiya\u00e7 duydu\u011fu tek \u015fey, kurban\u0131n telefonuna k\u00f6t\u00fc ama\u00e7l\u0131 bir mesaj g\u00f6ndermek.<\/p>\n<p>Ortaya \u00e7\u0131kar\u0131lan g\u00fcvenlik zafiyetlerinden d\u00f6rd\u00fc bu \u015fekilde uzaktan \u201cetkile\u015fimsiz\u201d kod y\u00fcr\u00fctme i\u00e7in kullan\u0131labilirken di\u011fer ikisi, sald\u0131rgan\u0131n hacklenen cihazdaki dosyalar\u0131 okuyabilmesini ve belle\u011finden veri s\u0131zd\u0131rabilmesini sa\u011fl\u0131yor.<\/p>\n<p>Alt\u0131 a\u00e7\u0131k bir araya geldi\u011finde, kullan\u0131c\u0131 tehlikeli kabul edilebilen herhangi bir \u015fey yapmasa bile kurban\u0131n iPhone\u2019unda depolanan t\u00fcm verileri ele ge\u00e7irilemek m\u00fcmk\u00fcn hale geliyor. Dahas\u0131, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-security-explainer\/5269\/\" target=\"_blank\" rel=\"noopener\">iOS\u2019a y\u00f6nelik antivir\u00fcs yaz\u0131l\u0131m\u0131 olmad\u0131\u011f\u0131 i\u00e7in<\/a>, kullan\u0131c\u0131n\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 aktiviteyi ne tespit edebilmesi ne de \u00f6nleyebilmesi m\u00fcmk\u00fcn.<\/p>\n<p>B\u00f6yle hatalar, k\u00f6t\u00fc ama\u00e7l\u0131 ki\u015filer i\u00e7in \u00e7ok nadir bulunan, de\u011ferli a\u00e7\u0131klar. \u00d6rne\u011fin, Zerodium\u2019un kamuya a\u00e7\u0131k fiyat tablosuna g\u00f6re bu seviyedeki hatalar\u0131n <em>tek bir tanesi bile<\/em> 1.000.000 USD\u2019a mal olabiliyor. \u00dcstelik say\u0131lar\u0131 ne kadar artarsa mal olduklar\u0131 zarar da bir o kadar art\u0131yor. <a href=\"https:\/\/www.zdnet.com\/article\/google-researchers-disclose-vulnerabilities-for-interactionless-ios-attacks\/\" target=\"_blank\" rel=\"noopener nofollow\">ZDNet de zaten bu hata grubunun olas\u0131 maliyetini<\/a> 5-10 milyon USD aral\u0131\u011f\u0131nda g\u00f6steriyor.<\/p>\n<p>Ara\u015ft\u0131rmac\u0131lara g\u00f6re iOS 12.4 bile hatalardan birini d\u00fczeltemedi\u011fi i\u00e7in bu g\u00fcvenlik a\u00e7\u0131klar\u0131ndan biri hakk\u0131ndaki ayr\u0131nt\u0131lar gizli tutuluyor. Silvanovich ve Gro\u00df, geri kalan hatalar\u0131n ayr\u0131nt\u0131lar\u0131n\u0131 ve sald\u0131rganlar taraf\u0131ndan nas\u0131l k\u00f6t\u00fcye kullan\u0131labileceklerini, yakla\u015fan <a href=\"https:\/\/www.blackhat.com\/us-19\/briefings\/schedule\/#look-no-hands----the-remote-interaction-less-attack-surface-of-the-iphone-15203\" target=\"_blank\" rel=\"noopener nofollow\">Black Hat USA g\u00fcvenlik konferans\u0131nda ger\u00e7ekle\u015ftirecekleri bir konu\u015fmada a\u00e7\u0131klayacak<\/a>.<\/p>\n<p>Her durumda t\u00fcm iOS kullan\u0131c\u0131lar\u0131n\u0131n yapabilece\u011fi en iyi ve en pratik \u015fey derhal iOS 12.4\u2019e ge\u00e7mek. iOS\u2019un bundan bir sonraki s\u00fcr\u00fcm\u00fc piyasaya s\u00fcr\u00fcld\u00fc\u011f\u00fcnde tekrar g\u00fcncellemeyi de geciktirmeyin; b\u00fcy\u00fck olas\u0131l\u0131kla bu g\u00fcvenlik a\u00e7\u0131klar\u0131yla ilgili kalan sorunlar bir sonraki s\u00fcr\u00fcmde tamamen \u00e7\u00f6z\u00fclecek.<\/p>\n<ul>\n<li>iOS\u2019u g\u00fcncellemek i\u00e7in <em>Ayarlar -&gt; Genel -&gt; Yaz\u0131l\u0131m G\u00fcncelleme<\/em> yolunu izleyerek <em>\u0130ndir ve Y\u00fckle<\/em> se\u00e7ene\u011fine dokunun.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6285 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/08\/01101054\/ios-124-update-screen-TK-715x1024.png\" alt=\"\" width=\"715\" height=\"1024\"><\/p>\n<ul>\n<li>Kulland\u0131\u011f\u0131n\u0131z yaz\u0131l\u0131mlardaki g\u00fcvenlik a\u00e7\u0131klar\u0131 hakk\u0131nda g\u00fcncel bilgi almak i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/security-cloud?redef=1&amp;reseller=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_post____ksc___\" target=\"_blank\" rel=\"noopener\">Kaspersky Security Cloud<\/a> kurun.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>iMessage&#8217;da uzaktan y\u00fcr\u00fctmeye ve kullan\u0131c\u0131 etkile\u015fimi olmadan veri \u00e7almaya izin veren alt\u0131 a\u011f\u0131r g\u00fcvenlik zafiyeti mi? Bir an \u00f6nce iOS 12.4 s\u00fcr\u00fcm\u00fcne y\u00fckseltmek i\u00e7in iyi bir sebep gibi g\u00f6r\u00fcn\u00fcyor.<\/p>\n","protected":false},"author":421,"featured_media":6284,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[774,1971,750,26,665,1972],"class_list":{"0":"post-6283","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-gozetleme","9":"tag-imessage","10":"tag-ios","11":"tag-iphone","12":"tag-mobil-cihazlar","13":"tag-zafiyetler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ios-critical-vulnerabilities-124\/6283\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ios-critical-vulnerabilities-124\/16284\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/13792\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/6392\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/18295\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ios-critical-vulnerabilities-124\/16370\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/15057\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ios-critical-vulnerabilities-124\/18984\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ios-critical-vulnerabilities-124\/17717\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ios-critical-vulnerabilities-124\/23240\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/27778\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ios-critical-vulnerabilities-124\/12058\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ios-critical-vulnerabilities-124\/12138\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ios-critical-vulnerabilities-124\/11024\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ios-critical-vulnerabilities-124\/19849\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ios-critical-vulnerabilities-124\/23807\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ios-critical-vulnerabilities-124\/18757\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ios-critical-vulnerabilities-124\/23099\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ios-critical-vulnerabilities-124\/23039\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=6283"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6283\/revisions"}],"predecessor-version":[{"id":6751,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6283\/revisions\/6751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/6284"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=6283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=6283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=6283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}