MS Internet Explorer 'Style' Object Remote Code Execution Vulnerability

Summary
This host is missing a critical security update according to Microsoft Bulletin MS09-072.
Impact
Successful exploitation will let the attacker execute arbitrary code via specially crafted HTML page in the context of the affected system and cause memory corruption thus causing remote machine compromise. Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/Bulletin/MS09-072.mspx
Insight
Multiple flaws are due to: - The 'tdc.ocx' ActiveX control being built with vulnerable Active Template Library (ATL) headers, which could allow the instantiation of arbitrary objects that can bypass certain security related policies. - Memory corruption error occurs when the browser attempts to access an object that has not been initialized or has been deleted, which could be exploited to execute arbitrary code via a specially crafted web page. - Memory corruption occurs when processing 'CSS' objects. - Race condition occurs while repetitively clicking between two elements at a fast rate, which could be exploited to execute arbitrary code via a specially crafted web page. - A dangling pointer during deallocation of a circular dereference for a CAttrArray object, which could be exploited to execute arbitrary code via a specially crafted web page.
Affected
Microsoft Internet Explorer version 5.x/6.x/7.x/8.x
References