{"id":9294,"date":"2021-02-07T12:48:54","date_gmt":"2021-02-07T09:48:54","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9294"},"modified":"2022-05-05T14:26:37","modified_gmt":"2022-05-05T11:26:37","slug":"update-google-chrome-to-8804324150","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/update-google-chrome-to-8804324150\/9294\/","title":{"rendered":"T\u00fcm kullan\u0131c\u0131lara: Google Chrome&#8217;unuzu bir an \u00f6nce g\u00fcncelleyin!"},"content":{"rendered":"<p>Ara\u015ft\u0131rmac\u0131lar, Google Chrome\u2019da <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2021-21148\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2021-21148<\/a> adl\u0131 kritik bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 tespit ettiler. Siber su\u00e7lular bu durumdan halihaz\u0131rda faydalanmaya devam etti\u011finden konu ile en k\u0131sa s\u00fcrede ilgilenmenizi \u00f6neriyoruz. Ana masa\u00fcst\u00fc i\u015fletim sistemlerindeki (Windows, MacOS ve Linux) taray\u0131c\u0131 s\u00fcr\u00fcmlerinin t\u00fcm\u00fc savunmas\u0131z durumda. Neler oldu\u011funa ve taray\u0131c\u0131n\u0131z\u0131 nas\u0131l g\u00fcncelleyebilece\u011finize bakal\u0131m.<\/p>\n<h2>CVE-2021-21148 neden tehlikelidir?<\/h2>\n<p><a href=\"https:\/\/www.cybersecurity-help.cz\/vdb\/SB2021020420\" target=\"_blank\" rel=\"noopener nofollow\">G\u00fcvenlik a\u00e7\u0131\u011f\u0131,<\/a> siber su\u00e7lular\u0131n, kurban\u0131n cihaz\u0131nda uzaktan kod \u00e7al\u0131\u015ft\u0131rmas\u0131na yol a\u00e7abilecek bir manip\u00fclasyon olan <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/heap-overflow-attack\/\" target=\"_blank\" rel=\"noopener\">y\u0131\u011f\u0131n a\u015f\u0131m sald\u0131r\u0131s\u0131<\/a> ger\u00e7ekle\u015ftirmesine imkan veriyor. Bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanmak, k\u00f6t\u00fc ama\u00e7l\u0131 bir web sayfas\u0131 haz\u0131rlamak ve kurbanlara tuzak kurmak kadar basit olabilse de bunun muhtemel bir y\u0131k\u0131c\u0131 sonucu siber su\u00e7lular\u0131n etkiledikleri sistem \u00fczerinde tam kontrol sahibi olabilmeleridir.<\/p>\n<p>B\u00f6yle bir durumda savunmas\u0131z kalan bile\u015fen, taray\u0131c\u0131ya g\u00f6m\u00fcl\u00fc olan JavaScript V8 motorudur. Google, 24 Ocak\u2019ta g\u00fcvenlik ara\u015ft\u0131rmac\u0131s\u0131 Mattias Buelens\u2019ten bahsedilen g\u00fcvenlik a\u00e7\u0131\u011f\u0131yla ilgili bilgi ald\u0131 ve 4 \u015eubat\u2019ta da i\u00e7erisinde bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131na y\u00f6nelik bir iyile\u015ftirmenin de oldu\u011fu bir yama yay\u0131nlad\u0131. Google, isimsiz hackerlar\u0131n aktif olarak CVE-2021-21148\u2019den yararlanmas\u0131yla ilgili raporlar\u0131 kabul etti.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/google-patches-an-actively-exploited-chrome-zero-day\/\" target=\"_blank\" rel=\"noopener nofollow\">Bir ZDnet makalesine g\u00f6re<\/a>, bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 Kuzey Kore\u2019den siber g\u00fcvenlik uzmanlar\u0131 toplulu\u011funa yap\u0131lan son hacker sald\u0131r\u0131lar\u0131 ile ba\u011flant\u0131l\u0131 olabilir. En az\u0131ndan ger\u00e7ekle\u015ftirilen bu sald\u0131r\u0131n\u0131n modeli ile CVE-2021-21148\u2019den faydalan\u0131lma modeli aras\u0131nda \u00e7arp\u0131c\u0131 benzerlikler var. Ayr\u0131ca, g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n fark edilme tarihi ile uzmanlara y\u00f6nelik ger\u00e7ekle\u015ftirilen bu sald\u0131r\u0131lar\u0131n a\u00e7\u0131kland\u0131\u011f\u0131 tarih birbirlerine olduk\u00e7a yak\u0131n. Ancak bu teori ile ilgili do\u011frudan bir onay hen\u00fcz gelmedi.<\/p>\n<p>Google her oldu\u011fu gibi konuyla ilgili daha fazla teknik ayr\u0131nt\u0131 vermeden \u00f6nce \u00e7o\u011fu aktif Chrome kullan\u0131c\u0131s\u0131n\u0131n taray\u0131c\u0131lar\u0131n\u0131 g\u00fcncellemesini bekliyor. Sorumsuzca yap\u0131lan bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 beyan\u0131 sald\u0131r\u0131lar\u0131n h\u0131zla artmas\u0131na neden olabilece\u011finden bu bekleme anla\u015f\u0131labilir.<\/p>\n<h2>G\u00fcvenli\u011finizi nas\u0131l sa\u011flayabilirsiniz?<\/h2>\n<ul>\n<li>Bilgisayar\u0131n\u0131zdaki Google Chrome\u2019u bir an \u00f6nce g\u00fcncelleyin. G\u00fcncelleme yapmak i\u00e7in; taray\u0131c\u0131 pencerenizin sa\u011f \u00fcst k\u00f6\u015fesinde \u00fc\u00e7 nokta bulunan butona t\u0131klay\u0131n ve <em>Ayarlar \u2192 Chrome Hakk\u0131nda<\/em>\u2018y\u0131 se\u00e7in. \u0130lgili sayfay\u0131 a\u00e7t\u0131\u011f\u0131n\u0131zda taray\u0131c\u0131n\u0131z otomatik olarak g\u00fcncellenmeye ba\u015flayacakt\u0131r.<\/li>\n<li>De\u011fi\u015fikliklerin devreye al\u0131nmas\u0131 istenirse taray\u0131c\u0131n\u0131z\u0131 yeniden ba\u015flat\u0131n. B\u00f6yle bir durumda taray\u0131c\u0131n\u0131z\u0131 hemen yeniden ba\u015flat\u0131n ve a\u00e7\u0131k sekmeleri kaybetme konusunda endi\u015felenmeyin; Chrome\u2019un modern s\u00fcr\u00fcmleri, taray\u0131c\u0131 yeniden ba\u015flat\u0131ld\u0131\u011f\u0131nda sekmeleri otomatik olarak geri y\u00fckler veya beklenmedik bir kapanma durumu ger\u00e7ekle\u015fti\u011finde sekmelerin geri y\u00fcklenmesini \u00f6nerir.<\/li>\n<li>Chrome\u2019un Hakk\u0131nda sayfas\u0131 kulland\u0131\u011f\u0131n\u0131z s\u00fcr\u00fcm\u00fcn zaten 88.0.4324.150 oldu\u011funu belirtiyorsa bu, taray\u0131c\u0131n\u0131z\u0131n g\u00fcncel oldu\u011fu ve art\u0131k CVE-2021-21148 g\u00fcvenlik a\u00e7\u0131\u011f\u0131 konusunda endi\u015felenmemeniz gerekti\u011fi anlam\u0131na gelir.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos\">\n","protected":false},"excerpt":{"rendered":"<p>Hackerlar, Google Chrome&#8217;daki kritik bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan faydalan\u0131yorlar. Google, Chrome 88.0.4324.150 yamas\u0131 ile g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 onard\u0131.<\/p>\n","protected":false},"author":2706,"featured_media":9297,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727,1351],"tags":[16,22,790,1749],"class_list":{"0":"post-9294","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"category-threats","11":"tag-chrome","12":"tag-google","13":"tag-guvenlik-aciklari","14":"tag-tarayicilar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/update-google-chrome-to-8804324150\/9294\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/update-google-chrome-to-8804324150\/22503\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/update-google-chrome-to-8804324150\/17993\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/update-google-chrome-to-8804324150\/8916\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/update-google-chrome-to-8804324150\/24207\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/update-google-chrome-to-8804324150\/22285\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/update-google-chrome-to-8804324150\/21013\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/update-google-chrome-to-8804324150\/24672\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/update-google-chrome-to-8804324150\/23901\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/update-google-chrome-to-8804324150\/30081\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/update-google-chrome-to-8804324150\/38678\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/update-google-chrome-to-8804324150\/16382\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/update-google-chrome-to-8804324150\/16931\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/update-google-chrome-to-8804324150\/14468\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/update-google-chrome-to-8804324150\/26181\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/update-google-chrome-to-8804324150\/30006\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/update-google-chrome-to-8804324150\/26685\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/update-google-chrome-to-8804324150\/23542\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/update-google-chrome-to-8804324150\/28882\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/update-google-chrome-to-8804324150\/28689\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/chrome\/","name":"Chrome"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9294"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9294\/revisions"}],"predecessor-version":[{"id":9296,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9294\/revisions\/9296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9297"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}