On September 19th, Microsoft issued an advisory about a new vulnerability in their Vector Markup Language (VML) implementation. While this code isn't used often, exploits have been created to leverage this vulnerability through Internet Explorer and Outlook. At this time, there are no patches available from Microsoft although there are numerous reports of these active exploitation of the vulnerability.
The current workaround is to unregister the VML dll. Instructions on how to do so can be found at the link below. Note that unregistering this DLL could cause some applications to not function properly.
Posted by Addam Schroll on September 25, 2006, in Handlers Log.