Windows Shell Vulnerability aka setslice exploit

So there is a new vulnerability (announced last week) accessed through Internet Explorer. Microsoft describes it as a Windows Shell vulnerability. You may see it listed through other sources as a setslice exploit.
The SANS ISC set their Infocon alert status to Yellow. Of course, they do this to increase “awareness” not because of any specific widespread threat. F-Secure reports that while its out there, they aren’t seeing it in huge numbers.
Of the mitigations listed, my favorite is to set the activeX kill bits.

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{e5df9d10-3b52-11d1-83e8-00a0c90dc849}]
“Compatibility Flags”=dword:00000400
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{844F4806-E8A8-11d2-9652-00C04FC30871}]
“Compatibility Flags”=dword:00000400

The problem with this mitigation (as with most mitigations) is understanding the potential impact. Microsoft reports that performing this step could cause “Web sites that use the WebViewFolderIcon ActiveX Control to no longer display or function correctly.” But there is no statement regarding how common this will actually be.
Additionally, I wonder if this will effect viewing folders locally. I dont know. The phrase WebviewFoldericon makes me wonder.
Lastly, while creating an activeX kill bit is easy, I feel like it is more difficult to put the computer back to its original state after the patch.
The bottom line is that I dont feel like I have enough information to make a decision.