{"id":46285,"date":"2022-06-21T17:30:04","date_gmt":"2022-06-21T14:30:04","guid":{"rendered":"https:\/\/kutaybilen.com.tr\/?p=46285"},"modified":"2022-06-21T17:30:04","modified_gmt":"2022-06-21T14:30:04","slug":"google-kullanicilarini-hack-hucumlarina-karsi-uyardi","status":"publish","type":"post","link":"https:\/\/kutaybilen.com.tr\/?p=46285","title":{"rendered":"Google, Kullan\u0131c\u0131lar\u0131n\u0131 Hack H\u00fccumlar\u0131na Kar\u015f\u0131 Uyard\u0131"},"content":{"rendered":"<p>Chrome&#8217;a yap\u0131lan ataklar\u0131n \u015fiddetinin gitgide artt\u0131\u011f\u0131 \u015fu g\u00fcnlerde Google, art\u0131k de<strong> iki kritik hack <\/strong>sald\u0131r\u0131s\u0131n\u0131 daha do\u011frulad\u0131. <\/p>\n<p>Yapt\u0131\u011f\u0131 yeni bir payla\u015f\u0131mda Google; bu y\u0131l\u0131n 12. Ve 13.<strong> \u2018S\u0131f\u0131r G\u00fcn\u00fc\u2019 (Zero-Day)<\/strong> a\u00e7\u0131klar\u0131n\u0131n (CVE-2021-37975 ve CVE-2021-37976) da bulundu\u011funu ve bunlar\u0131n <strong>Linux<\/strong>, <strong>macOS<\/strong> ve <strong>Windows <\/strong>kullan\u0131c\u0131lar\u0131n\u0131 etkiledi\u011fini duyurdu. Google rastgele bir d\u00fczeltme yay\u0131nlamadan evvel, bu a\u00e7\u0131klar\u0131n bilgisayar korsanlar\u0131 taraf\u0131ndan bilindi\u011fi manas\u0131na geldi\u011fi i\u00e7in s\u0131f\u0131r g\u00fcn\u00fc ataklar\u0131 olduk\u00e7a<strong> kritik<\/strong> bir k\u0131ymet arz ediyor. Bu da, Chrome kullan\u0131c\u0131lar\u0131n\u0131n <strong>tehlike alt\u0131nda<\/strong> oldu\u011fu manas\u0131na geliyor. <\/p>\n<p><b>Sald\u0131r\u0131lara dair \u015fimdi pek bir detay bilinmiyor<\/b><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0003\/29\/54589074e760d1c0281c4db953370313874fdc22.jpeg\"\/><\/p>\n<p>Protokole uygun bir halde Google, Chrome kullan\u0131c\u0131lar\u0131n\u0131n yeni s\u00fcr\u00fcme ge\u00e7melerine<strong> vakit sa\u011flamak<\/strong> hedefiyle \u015fimdilik her iki ata\u011fa dair bilgileri de k\u0131s\u0131tl\u0131yor. Bir \u00f6b\u00fcr \u2018Y\u00fcksek\u2019 dereceli tehditle birlikte, \u015firketin taarruzlara y\u00f6nelik yay\u0131nlad\u0131\u011f\u0131 tek detaylar ise \u015fu halde:  <\/p>\n<ul>\n<li><strong>Y\u00fcksek<\/strong> \u2014 CVE-2021-37974 : \u0130nan\u00e7l\u0131 Tarama&#8217;da h\u00fcr kald\u0131ktan sonra kullan\u0131n. 2021-09-01 tarihinde Qi&#8217;anxin Group&#8217;ta Codesafe Team of Legendsec&#8217;ten Weipeng Jiang taraf\u0131ndan bildirildi <\/li>\n<li><strong>Y\u00fcksek<\/strong> \u2014 CVE-2021-37975 : V8&#8217;de h\u00fcr kald\u0131ktan sonra kullan\u0131n. Anonymous taraf\u0131ndan 2021-09-24 tarihinde bildirildi <\/li>\n<li><strong>Orta<\/strong> \u2014 CVE-2021-37976 : \u00c7ekirdekte bilgi s\u0131z\u0131nt\u0131s\u0131. 2021-09-21&#8217;de Google Project Zero&#8217;dan Sergei Glazunov ve Mark Brand&#8217;in teknik takviyesiyle Google TAG&#8217;dan Cl\u00e9ment Lecigne taraf\u0131ndan bildirildi <\/li>\n<\/ul>\n<p>\u00d6zellikle de birinci s\u0131f\u0131r g\u00fcn\u00fc sald\u0131r\u0131s\u0131, son birka\u00e7 ayd\u0131r bilgisayar korsanlar\u0131 taraf\u0131ndan tekraren kere hedeflenen bir<strong> \u2018Use-After-Free&#8217; (UAF)<\/strong> g\u00fcvenlik a\u00e7\u0131\u011f\u0131yd\u0131. UAF g\u00fcvenlik a\u00e7\u0131klar\u0131, bir program \u00f6zg\u00fcr b\u0131rak\u0131ld\u0131ktan sonra i\u015faret\u00e7i belle\u011fi temizleyemedi\u011finde olu\u015fan bellek istismarlar\u0131d\u0131r.<strong> Eyl\u00fcl ve Ekim<\/strong> aylar\u0131nda da Chrome&#8217;da \u00e7ift haneli UAF ak\u0131nlar\u0131 saptanm\u0131\u015ft\u0131. <\/p>\n<p><b>Google, taarruzlara kar\u015f tedbir ald\u0131<\/b><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0003\/29\/219670e9405f153d7dd68bc51e2a62eb5f0d35b2.jpeg\"\/><\/p>\n<p>Sald\u0131r\u0131lara kar\u015f\u0131l\u0131k olarak Google kritik bir <strong>g\u00fcncelleme<\/strong> yay\u0131nlad\u0131; lakin \u015firket kullan\u0131c\u0131lar\u0131n\u0131 da\u011f\u0131t\u0131m\u0131n <strong>kademeli<\/strong> bir formda ger\u00e7ekle\u015fece\u011fi, bu y\u00fczden de herkesin kendisini \u00e7abucak <strong>an\u0131nda koruyamayaca\u011f\u0131<\/strong> konusunda uyard\u0131. Korunup korunmad\u0131\u011f\u0131n\u0131z\u0131 <strong>Ayarlar > Yard\u0131m > Google Chrome Hakk\u0131nda<\/strong>&#8216;ya giderek denetim edebilirsiniz. Kulland\u0131\u011f\u0131n\u0131z Chrome s\u00fcr\u00fcm\u00fcn\u00fcn <strong>94.0.4606.71 yahut \u00fczerinde<\/strong> olmas\u0131 durumunda endi\u015felenmenize gerek yok, g\u00fcvendesiniz. Fakat g\u00fcncelleme \u015fimdi taray\u0131c\u0131n\u0131z i\u00e7in mevcut de\u011filse, yapman\u0131z gereken tek \u015fey yeni s\u00fcr\u00fcm\u00fcn gelip gelmedi\u011fini <strong>d\u00fczenli olarak<\/strong> denetim etmek. <\/p>\n<p>Unutmadan belirtmekte yarar var; Chrome, g\u00fcncelleme ger\u00e7ekle\u015ftikten sonra bile <strong>yeniden ba\u015flat\u0131l\u0131ncaya kadar inan\u00e7l\u0131 de\u011fildir<\/strong>. Google her ne kadar Chrome hacklerini d\u00fczeltmekte s\u00fcratli olursa olsun, bilgisayar korsanlar\u0131 g\u00fcncelleme y\u00fcklendikten sonra hala savunmas\u0131z olduklar\u0131n\u0131n fark\u0131nda olmayan Chrome kullan\u0131c\u0131lar\u0131n\u0131 ama\u00e7 alabilir. Tam olarak bu y\u00fczden gidip bir taray\u0131c\u0131n\u0131z\u0131 denetim etseniz sizin i\u00e7in uygun olabilir.<\/p>\n<div> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Chrome&#8217;a yap\u0131lan ataklar\u0131n \u015fiddetinin gitgide artt\u0131\u011f\u0131 \u015fu g\u00fcnlerde Google, art\u0131k de iki kritik hack sald\u0131r\u0131s\u0131n\u0131 daha do\u011frulad\u0131. Yapt\u0131\u011f\u0131 yeni bir &#8230;<\/p>\n","protected":false},"author":1,"featured_media":46286,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[15],"tags":[884,1004,874,1728],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/46285"}],"collection":[{"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=46285"}],"version-history":[{"count":1,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/46285\/revisions"}],"predecessor-version":[{"id":46287,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/46285\/revisions\/46287"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/media\/46286"}],"wp:attachment":[{"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=46285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=46285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=46285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}