Apply Update
Microsoft has provided an update to address this vulnerability. To obtain this update, visit the Microsoft Update web site.
We also recommend enabling Automatic Updates.
Until the update can be applied, consider the following workarounds.
Disable Binary and Script Behaviors
Follow the steps in Microsoft Security Advisory (925568) under the section titled "Configure Internet Explorer 6 for Microsoft Windows XP Service Pack 2 to disable Binary and Script Behaviors in the Internet and Local Intranet security zone."
Do not follow unsolicited links
Do not click on unsolicited URLs, including those received in email, instant messages, web forums, or internet relay chat (IRC) channels.
An attacker could exploit a vulnerability in Internet Explorer Vector Markup Language (VML) by convincing a user to open an HTML document such as a web site or an HTML email message. The attacker could then take any action as the user, including installing malicious software and accessing sensitive personal information.
For more technical information, see Vulnerability Note VU#416092.