FYI...
FixIt NOW - 0-day XML Core Services...
> https://isc.sans.edu/diary.html?storyid=13489
Last Updated: 2012-06-16 15:58:47 UTC - "... metasploit module (public release) for this vulnerability. Users are encouraged to patch*..."
* http://support.microsoft.com/kb/2719615#FixItForMe
June 12, 2012 - Revision: 3.0
> http://web.nvd.nist.gov/view/vuln/de...=CVE-2012-1889 - 9.3 (HIGH)
- https://secunia.com/advisories/49456/
Last Update: 2012-06-22
Criticality level: Extremely critical
Impact: System access
Where: From remote
Solution Status: Vendor Workaround
... vulnerability is currently being actively exploited...
- http://h-online.com/-1619732
18 June 2012
- https://www.us-cert.gov/current/#mic..._advisory_for5
updated June 25, 2012
- http://nakedsecurity.sophos.com/2012...e-exploit-kit/
June 29, 2012 - "... CVE-2012-1889 exploiting code very similar to that published to Metasploit was seen within the landing page of a Blackhole exploit kit..."