Administrators are advised to apply the appropriate updates.
Users are advised not to open email messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in email messages are safe, they are advised not to open them.
Administrators may consider configuring Internet Explorer to prompt users before running Active Scripting or ActiveX controls by setting the Internet and Local Intranet security zone settings to High. Alternately, administrators could disable Active Scripting and ActiveX controls in these security zones.
Administrators may consider using the Microsoft Baseline Security Analyzer
(MBSA) scan tool to identify common security misconfigurations and missing security updates on system endpoints.
Microsoft customers are advised to apply the Fix it solution at the following link: CVE-2013-3893 MSHTML Shim Workaround
Administrators are advised to monitor affected systems.