Four issues identified by the Month of Apple Bugs project receive fixes from the company's developer.
Two of the flaws could allow an attacker to execute code on an unpatched system, Apple said. Patches are now available on Apple's Web site or through the Software Update selection under the Apple menu on a Mac.
Apple noted that proof-of-concepts for the flaws were posted on the
The two flaws that could lead to arbitrary code execution are found in Finder and iChat. There's a buffer overflow flaw in Finder that could allow an attacker to take control of a system by "enticing a user into mounting a malicious disk image," or tricking someone into enabling local access of a file supposedly stored on a remote server. Apple credited Kevin Finisterre, one of the participants in the Month of Apple Bugs project, for reporting the issue, something it did not do on the three other flaws patched on Thursday.
The other patch, for iChat, fixes an issue in which a user could click on a malicious URL in a chat session and trigger an overflow, possibly opening the system to an attacker.
Two patches concern flaws that require a malicious local user. This includes another iChat flaw that could cause the application to crash as well as a fix for a UserNotification flaw that could allow system files to be overwritten.