Microsoft DirectAnimation Path ActiveX control Vulnerability

Microsoft has published a security advisory regarding a DirectAnimation Path ActiveX control vulnerability in Internet Explorer versions prior to IE 7. This vulnerability could be exploited to install software on your computer without your knowledge.
One of the best ways to protect yourself against these ActiveX attacks is to set ActiveX kill bits to disallow execution of the exploitable control. I typically use Java Cool Software’s Spyware Blaster for this purpose. To do this manually,

set the kill bit for a CLSID with a value of {D7A7D7C3-D47F-11D0-89D3-00A0C90833E6}, paste the following text in a text editor such as Notepad. Then, save the file by using the .reg file name extension.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{D7A7D7C3-D47F-11D0-89D3-00A0C90833E6}]
“Compatibility Flags”=dword:00000400

Or SANS has provided an app to set/unset this kill bit.
http://isc.sans.org/diary.php?storyid=1706
One note about ActiveX kill bits. They tell an ActiveX control not to run in IE. In the past there have been vulnerabilities that would allow malicious code to ignore this disable bit. It should work now if you are up-to-date on patches.
Until a patch is provided you should take steps to mitigate this risk.