Just for the sake of clarity, there is an email attachment vector for this exploit that´s not widely reported. I have not seen any reports of it being used at this time. MS´s bulletin, in the FAQ´s, in Could this vulnerability be exploited through e-mail?, says it can be exploited if one open(s) an attachment that could exploit the vulnerability. ISS obliquely says attacks may occur by …simply embedding the required logic in specially crafted HTML emails..
Note – My Outlook Web Access runs in the Local intranet Zone, and MS´s suggested workaround for this IE Zone is change the Local intranet setting to prompt or disable for Active Script, or just crank the zone security setting to high for prompting.Read Full Story