{"id":8697,"date":"2020-08-24T12:06:26","date_gmt":"2020-08-24T09:06:26","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8697"},"modified":"2020-08-24T12:06:26","modified_gmt":"2020-08-24T09:06:26","slug":"cve-2020-1380-vulnerability","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/cve-2020-1380-vulnerability\/8697\/","title":{"rendered":"PowerFall Operasyonu: \u0130ki s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131\u011f\u0131"},"content":{"rendered":"<p>Teknolojilerimiz yak\u0131n zamanda G\u00fcney Koreli bir \u015firkete yap\u0131lan sald\u0131r\u0131y\u0131 engelledi. Uzmanlar\u0131m\u0131z siber su\u00e7lular\u0131n kulland\u0131\u011f\u0131 ara\u00e7lar\u0131 analiz ederken iki adet s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ke\u015ffetti. S\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131ndan ilkini Internet Explorer 11\u2019in JavaScript motorunda buldular. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131, sald\u0131rganlar\u0131n uzaktan rastgele kod y\u00fcr\u00fctmesine olanak sa\u011flad\u0131. Bir i\u015fletim sistemi hizmetinde tespit edilen s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131ndan ikincisi ise sald\u0131rganlar\u0131n ayr\u0131cal\u0131klar\u0131 y\u00fckseltmesine ve yetkisiz eylemler ger\u00e7ekle\u015ftirmesine izin veriyordu.<\/p>\n<p>Bu g\u00fcvenlik a\u00e7\u0131klar\u0131na y\u00f6nelik k\u00f6t\u00fcye kullan\u0131mlar ayn\u0131 anda yap\u0131ld\u0131. \u0130lk olarak, kurban, Internet Explorer 11\u2019deki bir a\u00e7\u0131\u011f\u0131n \u00e7al\u0131\u015fmas\u0131na izin verdi\u011fi k\u00f6t\u00fc ama\u00e7l\u0131 bir komut dosyas\u0131n\u0131 a\u00e7t\u0131 ve ard\u0131ndan sistem hizmetindeki bir a\u00e7\u0131k, k\u00f6t\u00fc ama\u00e7l\u0131 i\u015flemin ayr\u0131cal\u0131klar\u0131n\u0131 daha da art\u0131rd\u0131. Sonu\u00e7 olarak, sald\u0131rganlar sistemin kontrol\u00fcn\u00fc ele ge\u00e7irmeyi ba\u015fard\u0131. Sald\u0131rganlar\u0131n amac\u0131, birka\u00e7 \u00e7al\u0131\u015fan\u0131n bilgisayar\u0131n\u0131 tehlikeye atmak ve kurulu\u015fun i\u00e7 a\u011f\u0131na s\u0131zmakt\u0131.<\/p>\n<p>Uzmanlar\u0131m\u0131z bu k\u00f6t\u00fc niyetli giri\u015fime PowerFall Operasyonu ad\u0131n\u0131 verdiler. Mevcut olarak, ara\u015ft\u0131rmac\u0131lar bu giri\u015fim ile bilinen akt\u00f6rleri aras\u0131nda tam olarak bir ba\u011flant\u0131 kuramad\u0131lar. Ancak, istismarlar\u0131n benzerli\u011fine bak\u0131ld\u0131\u011f\u0131nda <a href=\"https:\/\/www.kaspersky.com\/blog\/the-dark-story-of-darkhotel\/15022\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">DarkHotel<\/a>\u2018in parma\u011f\u0131n\u0131n olma ihtimalini g\u00f6z ard\u0131 etmediler.<\/p>\n<p>Ara\u015ft\u0131rmac\u0131lar\u0131m\u0131z bulgular\u0131 ile ilgili Microsoft\u2019u bilgilendirdiklerinde, \u015firket ikinci g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 (sistem hizmetinde) zaten bildi\u011fini ve hatta bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 i\u00e7in bir yama yay\u0131nlam\u0131\u015f olduklar\u0131n\u0131 s\u00f6yledi. Ancak Microsoft\u2019u ilk g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ile ilgili bilgilendirene kadar (IE11\u2019de), Microsoft bu a\u00e7\u0131\u011f\u0131n olas\u0131 olmad\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcyordu.<br>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8699\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2020\/08\/24115734\/CVE-2020-1380_list.png\" alt=\"\" width=\"918\" height=\"100\"><\/p>\n<h2>CVE-2020-1380 neden tehlikelidir?<\/h2>\n<p>\u0130lk g\u00fcvenlik a\u00e7\u0131\u011f\u0131, IE9\u2019dan bu yana t\u00fcm Internet Explorer s\u00fcr\u00fcmlerinin varsay\u0131lan olarak kulland\u0131\u011f\u0131 jscript9.dll kitapl\u0131\u011f\u0131ndad\u0131r. Ba\u015fka bir deyi\u015fle, bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlan\u0131lmas\u0131 taray\u0131c\u0131n\u0131n modern s\u00fcr\u00fcmleri i\u00e7in tehlikelidir (Microsoft\u2019un Windows 10 ile birlikte Edge\u2019i piyasaya s\u00fcrmesinin ard\u0131ndan Internet Explorer\u2019\u0131 geli\u015ftirmeyi durdurdu\u011fu d\u00fc\u015f\u00fcn\u00fcld\u00fc\u011f\u00fcnde \u201cmodern\u201d kelimesi belki de \u00e7ok do\u011fru bir s\u0131fat de\u011fildir). Ancak, Edge ile birlikte Internet Explorer, h\u00e2l\u00e2 Windows\u2019un son s\u00fcr\u00fcm\u00fcnde varsay\u0131lan olarak y\u00fckl\u00fcd\u00fcr ve i\u015fletim sisteminin \u00f6nemli bir bile\u015feni olmaya devam etmektedir.<\/p>\n<p>Internet Explorer\u2019\u0131 isteyerek kullanmasan\u0131z ya da varsay\u0131lan taray\u0131c\u0131n\u0131z olmasa bile bu, sisteminizin bir Internet Explorer g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan etkilenemeyece\u011fi anlam\u0131na gelmez \u00e7\u00fcnk\u00fc baz\u0131 uygulamalar zaman zaman Internet Explorer kullan\u0131r. \u00d6rne\u011fin Microsoft Office\u2019i ele alal\u0131m: Microsoft Office, belgelerdeki video i\u00e7eri\u011fini g\u00f6r\u00fcnt\u00fclemek i\u00e7in Internet Explorer\u2019\u0131 kullan\u0131r. Siber su\u00e7lular da, di\u011fer g\u00fcvenlik a\u00e7\u0131klar\u0131 arac\u0131l\u0131\u011f\u0131yla Internet Explorer\u2019\u0131 kullanabilirler.<\/p>\n<p>CVE-2020-1380, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/use-after-free\/\" target=\"_blank\" rel=\"noopener\">Use-After-Free<\/a> s\u0131n\u0131f\u0131na aittir ve dinamik belle\u011fin yanl\u0131\u015f kullan\u0131m\u0131ndan yararlan\u0131r. Securelist internet sitesinde yer alan \u201c<a href=\"https:\/\/securelist.com\/ie-and-windows-zero-day-operation-powerfall\/97976\/\" target=\"_blank\" rel=\"noopener\">PowerFall Operasyonu\u2019nda kullan\u0131lan Internet Explorer 11 ve Windows s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n tam zinciri<\/a>\u201d ba\u015fl\u0131kl\u0131 yaz\u0131da, g\u00fcvenlik ihlali g\u00f6stergeleriyle birlikte k\u00f6t\u00fcye kullan\u0131m\u0131n ayr\u0131nt\u0131l\u0131 teknik a\u00e7\u0131klamas\u0131n\u0131 okuyabilirsiniz.<\/p>\n<h2>Nas\u0131l korunabilirsiniz?<\/h2>\n<p>Microsoft, 9 Haziran 2020\u2019de <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0986\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2020-0986<\/a> (Windows \u00e7ekirde\u011finde) i\u00e7in bir yama yay\u0131nlad\u0131. \u0130kinci g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1380\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2020-1380, 11 A\u011fustos\u2019ta d\u00fczeltildi<\/a>. \u0130\u015fletim sistemlerinizi d\u00fczenli olarak g\u00fcncellerseniz PowerFall Operasyonu gibi sald\u0131r\u0131lara kar\u015f\u0131 sisteminiz zaten korunmu\u015f olmal\u0131d\u0131r.<\/p>\n<p>Ancak, s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131 ile her zaman kar\u015f\u0131la\u015f\u0131lmaktad\u0131r. \u015eirketinizin g\u00fcvenli\u011fini sa\u011flamak i\u00e7in, <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Security for Business<\/a> gibi k\u00f6t\u00fcye kullan\u0131m\u0131 \u00f6nleme teknolojilerine sahip bir \u00e7\u00f6z\u00fcm kullanman\u0131z gerekir. Kaspersky Security for Business\u2019\u0131n bile\u015fenlerinden biri olan Exploit Prevention alt sistemi, s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanma giri\u015fimlerini tan\u0131mlar.<\/p>\n<p>Bunlara ek olarak, d\u00fczenli olarak g\u00fcvenlik g\u00fcncellemelerinin geldi\u011fi modern taray\u0131c\u0131lar\u0131 kullanman\u0131z\u0131 \u00f6neririz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Teknolojilerimiz bir sald\u0131r\u0131y\u0131 engelledi. Uzman analizi, \u00f6nceden bilinmeyen iki g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n k\u00f6t\u00fcye kullan\u0131ld\u0131\u011f\u0131n\u0131 ortaya \u00e7\u0131kard\u0131. Bilmeniz gereken her \u015fey.<\/p>\n","protected":false},"author":2581,"featured_media":8698,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[493,790],"class_list":{"0":"post-8697","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-apt","10":"tag-guvenlik-aciklari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cve-2020-1380-vulnerability\/8697\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cve-2020-1380-vulnerability\/21674\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cve-2020-1380-vulnerability\/17137\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cve-2020-1380-vulnerability\/23004\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cve-2020-1380-vulnerability\/21195\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cve-2020-1380-vulnerability\/19890\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cve-2020-1380-vulnerability\/23630\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cve-2020-1380-vulnerability\/22527\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cve-2020-1380-vulnerability\/28892\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cve-2020-1380-vulnerability\/36698\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cve-2020-1380-vulnerability\/15437\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cve-2020-1380-vulnerability\/15897\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cve-2020-1380-vulnerability\/13846\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cve-2020-1380-vulnerability\/24867\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/cve-2020-1380-vulnerability\/11794\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cve-2020-1380-vulnerability\/28981\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/cve-2020-1380-vulnerability\/25845\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cve-2020-1380-vulnerability\/22717\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cve-2020-1380-vulnerability\/27964\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cve-2020-1380-vulnerability\/27794\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guvenlik-aciklari\/","name":"g\u00fcvenlik a\u00e7\u0131klar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8697"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8697\/revisions"}],"predecessor-version":[{"id":8700,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8697\/revisions\/8700"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8698"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}