A real quicky for you folks.
Microsoft has issued a fix to prevent exploitation of the True Type vulnerability which allows exploitation of the Win x32 true type font parsing engine (the Duqu Trojan/virus rootkit).
An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The fix is for x486 and x64 systems. It’s a “work around”, but it works and is strongly recommended until MS issues a “patch”
Just so you know, the vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must open an attachment that is sent in an e-mail message.
Patch Tuesday is coming up, by the way. Four updates are expected this time.
The fix can be obtained here: http://support.microsoft.com/kb/2639658
Important Update:
This temporary fix prevents sfc /scannow. It will abort at 28% (mine did). The "Disable" (see above) re-enables sfc /scannow.