An attacker cannot directly exploit this vulnerability, and instead must convince a user to participate in an attack by viewing a malicious document. Attackers may deliver files to users as e-mail attachments or posted on public websites, and attackers may use social engineering techniques in an attempt to convince users to open a provided document.
Systems most at risk are end-user hosts on which users run applications with elevated privileges, as any code execution as the result of an exploit may also run with elevated privileges, possibly resulting in a complete compromise. Systems that restrict user privileges may have less risk in the event of an exploit because any executed code would run in a limited security context, affecting only user files.
The Cisco Applied Intelligence team has created an Applied Mitigation Bulletin to address vulnerabilities that Microsoft disclosed in the November 2009 security bulletin release. This Cisco bulletin, which assists administrators in identifying or mitigating these vulnerabilities using Cisco devices, is available at the following link: Cisco Applied Mitigation Bulletin: Microsoft Security Bulletin Release for November 2009