eEye Digital security released on the 27th of March a patch that
can be a temporary workaround for the mentioned vulnerability in
IE. Affected software versions range from IE 5.01 to IE 6.0 on
Windows 2000 SP4 up to Windows 2003 including x64 edition of
Windows XP. The vulnerability even extends to IE 6 on Windows 9X
platforms. Successful exploitation of this vulnerability could
escalate an attackers rights to that of the local user.
Administrators are advised not to use administrator accounts for
general use.
The patch can be downloaded from eEye’s website or you can access
it here
More information about this vulnerability from Microsoft’s advisory
Websites that exploits this vulnerability are currently being
detected as EXPL_TXTRANGE.A and EXPL_TXTRANGE.B variants and
according to solutions presented by Trend Micro, disabling your
active scripting is one way of temporarily beating this
vulnerability. Microsoft presents a way of disabling active
scripting here
More Information about the said detections in our VE.
EXPL_TXTRANGE.A
EXPL_TXTRANGE.B