Microsoft have announced a vulnerability in Microsoft Video ActiveX Control that allows remote code execution. This is reported to affect versions of Windows XP and Window Server 2003.
CCIP is bringing this to your attention as this vulnerability has been reported as being actively exploited in the wild.
MITIGATION
Administrators are advised to take the following mitigation steps immediately.
There is currently no patch to correct this issue. However you can set the kill-bit to mitigate this vulnerability.
Microsoft have provided a way to automatically implement the workaround by following the instructions under "Fix It For Me" in the following Knowledge Base article: http://support.microsoft.com/kb/972890
Alternatively the following quoted text can be included in a .REG file and imported into your registry.
---BEGIN QUOTE---
Windows Registry Editor Version 5.00
Please note that in addition to the class identifier listed in the above example there is a full list of class identifiers in the
Suggested Actions-->Workarounds section of the Microsoft Advisory: http://www.microsoft.com/technet/security/advisory/972890.mspx
It is recommended that all of them are implemented.