Microsoft 'patch in works for IE zero-day' vulnerability

Microsoft added a workaround to the advisory that helps to mitigate the vulnerability by disabling the peer factory class through the modification of a registry key. “We have added a Microsoft Fix It to automate this workaround for Windows XP and Windows Server 2003 customers. As always, customers should test this thoroughly before deploying as […]

Microsoft added a workaround to the advisory that helps to mitigate the vulnerability by disabling the peer factory class through the modification of a registry key. “We have added a Microsoft Fix It to automate this workaround for Windows XP and Windows Server 2003 customers. As always, customers should test this thoroughly before deploying as certain functionality that depends on the peer factory class, such as printing from Internet Explorer and the use of web folders, may be affected,” Jerry Bryant, Sr. security communications manager lead, revealed. In addition, Microsoft has also been updating Security Advisory 981374, a resource designed to centralize various pieces of information available on the Critical 0-day invalid pointer reference IE vulnerability,” stated Microsoft.

[Source]