Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to have network access.
Administrators may consider configuring the Microsoft Enhanced Mitigation Experience Toolkit
to work with the affected software.
Users are advised to update browser plug-ins, or remove or disable plug-ins that are no longer in use or could be dangerous to operate. Users may consider allowing browser plug-ins to run only on trusted sites, configurable within Internet Explorer.
Users are advised not to open email messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in email messages are safe, they are advised not to open them.
Administrators are advised to use an unprivileged account when browsing the Internet.
Administrators are advised to monitor critical systems.
Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit this vulnerability.
Administrators can apply Snort signatures 30794 and 30803 to help prevent attacks that attempt to exploit this vulnerability.