{"id":9524,"date":"2021-04-15T12:56:26","date_gmt":"2021-04-15T09:56:26","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9524"},"modified":"2021-04-15T12:59:06","modified_gmt":"2021-04-15T09:59:06","slug":"cve-2021-28310","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/cve-2021-28310\/9524\/","title":{"rendered":"CVE-2021-28310: K\u0131r\u0131k bir pencere"},"content":{"rendered":"<p>Kaspersky ara\u015ft\u0131rmac\u0131lar\u0131, Masa\u00fcst\u00fc Pencere Y\u00f6neticisi (DWM) adl\u0131 Microsoft Windows bile\u015feninde bir s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131\u011f\u0131 (CVE-2021-28310) oldu\u011funu <a href=\"https:\/\/securelist.com\/zero-day-vulnerability-in-desktop-window-manager-cve-2021-28310-used-in-the-wild\/101898\/\" target=\"_blank\" rel=\"noopener\">ke\u015ffetti<\/a>. Tehditin akt\u00f6rlerinden bir\u00e7o\u011funun s\u00f6z konusu g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan \u00e7oktan faydaland\u0131\u011f\u0131na inan\u0131yoruz. Microsoft k\u0131sa bir s\u00fcre \u00f6nce konu ile ilgili bir yama yay\u0131nlad\u0131. Bu yamay\u0131 bir an \u00f6nce uygulaman\u0131z\u0131 \u00f6neriyoruz. Nedeni ise \u015fu\u2026<\/p>\n<h2>Masa\u00fcst\u00fc Pencere Y\u00f6neticisi nedir?<\/h2>\n<p>Neredeyse herkes, modern i\u015fletim sistemlerinin pencereli aray\u00fczlerine a\u015finad\u0131r: her program, ekran\u0131n tamam\u0131n\u0131 kaplamas\u0131 gerekmese de ayr\u0131 bir pencerede a\u00e7\u0131l\u0131r. Ancak bu pencereler \u00fcst \u00fcste gelebilir. \u00d6rne\u011fin, bir pencere, sanki fiziksel olarak \u0131\u015f\u0131\u011f\u0131 engelliyor gibi ba\u015fka bir pencerenin \u00fczerine g\u00f6lge d\u00fc\u015f\u00fcrebilir. Masa\u00fcst\u00fc Pencere Y\u00f6neticisi de Microsoft Windows i\u015fletim sisteminde g\u00f6lgeler ve saydaml\u0131k gibi \u00f6zelliklerin olu\u015fturulmas\u0131ndan sorumlu bile\u015fendir.<\/p>\n<p>Masa\u00fcst\u00fc Pencere Y\u00f6neticisi\u2019nin siber g\u00fcvenlik ba\u011flam\u0131nda neden \u00f6nemli oldu\u011funu anlamak i\u00e7in, programlar\u0131n ekrana sadece pencerelerini \u00e7izmedi\u011fini bilmeniz gerekir; ayn\u0131 zamanda gerekli bilgileri bir arabelle\u011fe de koyarlar. Masa\u00fcst\u00fc Pencere Y\u00f6neticisi, bu bilgileri her program\u0131n arabelle\u011finden alarak kullan\u0131c\u0131n\u0131n g\u00f6rd\u00fc\u011f\u00fc genel bile\u015fik g\u00f6r\u00fcn\u00fcm\u00fc olu\u015fturur. \u00d6rne\u011fin, bir kullan\u0131c\u0131 bir pencereyi ba\u015fka bir pencerenin \u00fczerine ta\u015f\u0131d\u0131\u011f\u0131nda, a\u00e7\u0131k programlar, kendi pencerelerinin mi g\u00f6lge d\u00fc\u015f\u00fcrmesi gerekti\u011fi yoksa kendi \u00fczerlerinde mi g\u00f6lge olmas\u0131 gerekti\u011fi hakk\u0131nda hi\u00e7bir \u015fey bilmezler. \u0130\u015fte bu g\u00f6revi \u00fcstlenen bile\u015fen ise Masa\u00fcst\u00fc Pencere Y\u00f6neticisi\u2019dir. Hatta bu bile\u015fen Windows Vista\u2019dan beri her Windows s\u00fcr\u00fcm\u00fcnde bulunan ve Windows 8 veya sonraki s\u00fcr\u00fcmlerde devre d\u0131\u015f\u0131 dahi b\u0131rak\u0131lamayan olduk\u00e7a \u00f6nemli bir Windows hizmetidir.<\/p>\n<h2>Masa\u00fcst\u00fc Pencere Y\u00f6neticisi\u2019nin g\u00fcvenlik a\u00e7\u0131\u011f\u0131<\/h2>\n<p>Geli\u015fmi\u015f a\u00e7\u0131k \u00f6nleme teknolojimizin ke\u015ffetti\u011fi g\u00fcvenlik a\u00e7\u0131\u011f\u0131, bir <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/privilege-escalation\/\" target=\"_blank\" rel=\"noopener\">ayr\u0131cal\u0131k y\u00fckseltmesi<\/a> g\u00fcvenlik a\u00e7\u0131\u011f\u0131. Bu da, bir program\u0131n, Masa\u00fcst\u00fc Pencere Y\u00f6neticisi\u2019ni, vermemesi gereken bir eri\u015fim iznini vermesi i\u00e7in kand\u0131rabilece\u011fi anlam\u0131na geliyor. Bu durumda, s\u00f6z konusu g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan faydalanan sald\u0131rganlar, kurbanlar\u0131n\u0131n cihazlar\u0131nda rastgele kod y\u00fcr\u00fctebildi; yani asl\u0131nda sald\u0131rganlar, bu bilgisayarlar \u00fczerinde tam bir kontrol sa\u011flam\u0131\u015f oldu.<\/p>\n<h2>CVE-2021-28310 g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan faydalan\u0131lmas\u0131n\u0131 nas\u0131l \u00f6nleyebilirsiniz?<\/h2>\n<p>H\u0131zl\u0131ca hareket etmek \u00e7ok \u00f6nemli. Yapabilece\u011finiz \u015feyler ise \u015funlar:<\/p>\n<ul>\n<li>G\u00fcvenlik riski olan t\u00fcm bilgisayarlara <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28310\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft\u2019un 13 Nisan\u2019da yay\u0131mlad\u0131\u011f\u0131 yamalar\u0131<\/a> bir an \u00f6nce y\u00fckleyin;<\/li>\n<li>Sahip oldu\u011fu geli\u015fmi\u015f a\u00e7\u0131k \u00f6nleme bile\u015feni ile CVE-2021-28310 g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan faydalanma giri\u015fimlerini engelleyen <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security for Business<\/a> gibi sa\u011flam bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcyle t\u00fcm cihazlar\u0131n\u0131z\u0131 koruyun.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Windows&#8217;daki bir s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan \u00e7oktan faydalan\u0131lm\u0131\u015f olabilir.<\/p>\n","protected":false},"author":2581,"featured_media":9525,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1287,1194,1351],"tags":[2158,1737,790,2404,38,2157,113],"class_list":{"0":"post-9524","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-news","9":"category-business","10":"category-threats","11":"tag-0-gun","12":"tag-cve","13":"tag-guvenlik-aciklari","14":"tag-istismarlar","15":"tag-microsoft","16":"tag-sifir-gun","17":"tag-windows"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cve-2021-28310\/9524\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cve-2021-28310\/22719\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cve-2021-28310\/18200\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/cve-2021-28310\/9036\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cve-2021-28310\/24553\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cve-2021-28310\/22581\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cve-2021-28310\/21634\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cve-2021-28310\/25057\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cve-2021-28310\/24383\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cve-2021-28310\/30513\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cve-2021-28310\/39352\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cve-2021-28310\/16754\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cve-2021-28310\/17310\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cve-2021-28310\/26518\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cve-2021-28310\/30464\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/cve-2021-28310\/26903\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cve-2021-28310\/23747\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cve-2021-28310\/29092\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cve-2021-28310\/28890\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guvenlik-aciklari\/","name":"g\u00fcvenlik a\u00e7\u0131klar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9524"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9524\/revisions"}],"predecessor-version":[{"id":9528,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9524\/revisions\/9528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9525"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}