It seems the permanent fix will not be in this month's normal "Patch Tuesday" schedule. Therefore, Microsoft recommends following the Suggested Actions listed under the Mitigating Factors and Suggested Actions sections of the
Microsoft Security Advisory (2501696).
It is interesting to note the mitigating factors. One set involves Windows Server and so does not affect most readers here. The two that might be applicable are:
• By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML e-mail messages in the Restricted sites zone, which disables script and ActiveX controls, removing the risk of an attacker being able to use this vulnerability to execute malicious code. If a user clicks a link in an e-mail message, the user could still be vulnerable to exploitation of this vulnerability through the Web-based attack scenario.
• In a Web-based attack scenario, a Web site could contain a specially crafted link (MHTML) that is used to exploit this vulnerability. An attacker would have to convince users to visit the Web site and open a specially crafted URL, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site, and then convincing them to click the specially crafted link.
The first, even though Outlook, Outlook Express and Windows Mail disable script and ActiveX controls, a user could circumvent those defenses by clicking on a link in an email that takes him to a compromised and/or malicious site. The second also requires the user to be duped into clicking a "specially crafted link" that takes him or her to a compromised and/or malicious site.
So it would appear it again boils down to user discipline and awareness. Some of these badguys are very clever con artists, experienced at convincing people of something's legitimacy. Do not take anything for granted. If you did not solicit the email or IM, be suspicious, even if you recognize the source. Do not assume all your contacts are as diligent as you. Their systems could be compromised and used by the badguys to distribute their malicious code.