{"id":71891,"date":"2024-08-20T10:24:06","date_gmt":"2024-08-20T10:24:06","guid":{"rendered":"https:\/\/ekamu.net\/?p=71891"},"modified":"2024-08-20T10:24:06","modified_gmt":"2024-08-20T10:24:06","slug":"microsoft-uygulamalari-apple-bilgisayarlarda-guvenlik-acigi-olusturuyor","status":"publish","type":"post","link":"https:\/\/ekamu.net\/index.php\/2024\/08\/20\/microsoft-uygulamalari-apple-bilgisayarlarda-guvenlik-acigi-olusturuyor\/","title":{"rendered":"Microsoft uygulamalar\u0131 Apple bilgisayarlarda g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olu\u015fturuyor"},"content":{"rendered":"<p><figure> <span> <img decoding=\"async\" src=\"https:\/\/ekamu.net\/wp-content\/uploads\/2024\/08\/microsoft-uygulamalari-apple-bilgisayarlarda-guvenlik-acigi-olusturuyor-0-xFzwtan4.jpg\"\/> <\/span> Ara\u015ft\u0131rmac\u0131lar, <strong>macOS<\/strong> i\u00e7in geli\u015ftirilmi\u015f Teams, Outlook, Word, PowerPoint, OneNote ve Excel gibi bir dizi <strong>Microsoft<\/strong> uygulamas\u0131nda <strong>g\u00fcvenlik a\u00e7\u0131\u011f\u0131<\/strong> ke\u015ffetti. Bu a\u00e7\u0131\u011f\u0131 kullanan hackerlar kullan\u0131c\u0131n\u0131n mikrofonuna, kameras\u0131na, klas\u00f6rlerine, ekran kayd\u0131na, kullan\u0131c\u0131 girdisine ve daha fazlas\u0131na eri\u015fim sa\u011flayabiliyor. <\/figure>\n<p><b>Microsoft uygulamalar\u0131nda g\u00fcvenlik a\u00e7\u0131\u011f\u0131<\/b><\/p>\n<p>Cisco Talos&#8217;tan g\u00fcvenlik ara\u015ft\u0131rmac\u0131lar\u0131 taraf\u0131ndan payla\u015f\u0131lan blog g\u00f6nderisinde a\u00e7\u0131\u011f\u0131n sald\u0131rganlar taraf\u0131ndan nas\u0131l istismar edilebilece\u011fi ve Microsoft&#8217;un bu a\u00e7\u0131\u011f\u0131 gidermek i\u00e7in neler yapt\u0131\u011f\u0131 detayland\u0131r\u0131ld\u0131. Ke\u015ffedilen <strong>sekiz g\u00fcvenlik a\u00e7\u0131\u011f\u0131 <\/strong>kullan\u0131c\u0131lar\u0131n g\u00f6zetlenmesine izin veriyor. Kullan\u0131c\u0131lar bu uygulamalara cihaz kaynaklar\u0131na eri\u015fim izni verdiyse bilgisayar korsanlar\u0131n\u0131n bunlar\u0131, kullan\u0131c\u0131lar\u0131n haberi olmadan<strong> gizlice video veya ses kaydetmek<\/strong> i\u00e7in kullanabilece\u011fi anlam\u0131na geliyor. \u00d6rne\u011fin, kamera ve mikrofon eri\u015fimi olan bir g\u00f6r\u00fcnt\u00fcl\u00fc sohbet uygulamas\u0131 istismar edilirse, kullan\u0131c\u0131y\u0131 uyarmadan kay\u0131t yapmak i\u00e7in kullan\u0131labilir. Excel hari\u00e7 t\u00fcm uygulamalar ses kaydetme \u00f6zelli\u011fine sahip, hatta baz\u0131lar\u0131 kameraya bile eri\u015febiliyor.<\/p>\n<figure> <span> <img decoding=\"async\" src=\"https:\/\/ekamu.net\/wp-content\/uploads\/2024\/08\/microsoft-uygulamalari-apple-bilgisayarlarda-guvenlik-acigi-olusturuyor-1-p7FWO35A.jpg\"\/> <\/span> Sald\u0131r\u0131, Microsoft uygulamalar\u0131na k\u00f6t\u00fc niyetli k\u00fct\u00fcphaneler enjekte ederek bu uygulamalar\u0131n yetkilerini ve kullan\u0131c\u0131 taraf\u0131ndan verilen izinleri elde etmeye dayan\u0131yor. Esas\u0131nda Apple\u2019\u0131n macOS\u2019ta konum hizmetleri, kamera, mikrofon, kitapl\u0131k foto\u011fraflar\u0131 ve di\u011fer dosyalar gibi \u015feylere eri\u015fmek i\u00e7in uygulama izinlerini y\u00f6neten Transparency Consent and Control (TCC) olarak bilinen bir \u00e7er\u00e7eve bulunuyor. <\/figure>\n<p>Her uygulama TCC&#8217;den izin talep etmek i\u00e7in bir yetkiye ihtiya\u00e7 duyuyor. Bu yetkilere sahip olmayan uygulamalar izin talebinde bulunmazlar ve dolay\u0131s\u0131yla kameraya ve bilgisayar\u0131n di\u011fer b\u00f6l\u00fcmlerine eri\u015femezler. Ancak a\u00e7\u0131k, k\u00f6t\u00fc niyetli yaz\u0131l\u0131mlar\u0131n Microsoft uygulamalar\u0131na verilen izinleri kullanmas\u0131na izin veriyor.<\/p>\n<p><b>\u00c7\u00f6z\u00fcm \u00fczerinde \u00e7al\u0131\u015f\u0131l\u0131yor<\/b><\/p>\n<p>Cisco Talos&#8217;a g\u00f6re Microsoft, \u00fc\u00e7\u00fcnc\u00fc taraf eklentilerini desteklemek i\u00e7in imzas\u0131z k\u00fct\u00fcphanelerin y\u00fcklenmesine dayanan bu a\u00e7\u0131\u011f\u0131 \u201c<strong>d\u00fc\u015f\u00fck riskli<\/strong>\u201d olarak de\u011ferlendiriyor. A\u00e7\u0131klar\u0131n rapor edilmesinin ard\u0131ndan Microsoft, macOS i\u00e7in Microsoft <strong>Teams<\/strong> ve <strong>OneNote<\/strong> uygulamalar\u0131n\u0131 g\u00fcncelleyerek a\u00e7\u0131\u011f\u0131 ortadan kald\u0131rd\u0131. Excel, Outlook, PowerPoint ve Word&#8217;\u00fcn savunmas\u0131z kalmaya devam etti\u011fi belirtiliyor. Bu uygulamalar\u0131n ne zaman g\u00fcncellenece\u011fi \u015fimdilik belirsiz.<\/p>\n\n<p><span style=\"display: block; width: 343.125px; color: rgb(55, 58, 60); font-size: 14px; background-color: rgb(255, 249, 236);\"><\/span><\/p>\n<p>Kaynak :\u00a0<span style=\"background-color: rgb(255, 249, 236); color: rgb(55, 58, 60); font-size: 14px;\">https:\/\/www.donanimhaber.com\/microsoft-uygulamalari-mac-lerde-guvenlik-acigi-olusturuyor&#8211;180912<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ara\u015ft\u0131rmac\u0131lar, macOS i\u00e7in geli\u015ftirilmi\u015f Teams, Outlook, Word, PowerPoint, OneNote ve Excel gibi bir dizi Microsoft uygulamas\u0131nda g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ke\u015ffetti. Bu a\u00e7\u0131\u011f\u0131 kullanan hackerlar kullan\u0131c\u0131n\u0131n mikrofonuna, kameras\u0131na, klas\u00f6rlerine, ekran &#8230;<\/p>\n","protected":false},"author":1,"featured_media":71892,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[1537,429,233,563,3064],"class_list":["post-71891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknoloji","tag-acigi","tag-izin","tag-kullanici","tag-microsoft","tag-uygulamalar"],"_links":{"self":[{"href":"https:\/\/ekamu.net\/index.php\/wp-json\/wp\/v2\/posts\/71891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ekamu.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ekamu.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ekamu.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ekamu.net\/index.php\/wp-json\/wp\/v2\/comments?post=71891"}],"version-history":[{"count":1,"href":"https:\/\/ekamu.net\/index.php\/wp-json\/wp\/v2\/posts\/71891\/revisions"}],"predecessor-version":[{"id":71895,"href":"https:\/\/ekamu.net\/index.php\/wp-json\/wp\/v2\/posts\/71891\/revisions\/71895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ekamu.net\/index.php\/wp-json\/wp\/v2\/media\/71892"}],"wp:attachment":[{"href":"https:\/\/ekamu.net\/index.php\/wp-json\/wp\/v2\/media?parent=71891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ekamu.net\/index.php\/wp-json\/wp\/v2\/categories?post=71891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ekamu.net\/index.php\/wp-json\/wp\/v2\/tags?post=71891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}