UPDATE September 2nd 2010 - Microsoft has issued new updated guidance and a new tool to help customers manage this within their environments. This new tool helps configure environments to address the root cause of the issue, while software vendors update applications. Highly recommend that organizations examine and use this tool to prevent exploitation. As with most reported vulnerabilities Microsoft has issued a response to the DLL Preloading issue that has been hotly discussed. Their advisory is interesting; 1. First they recommend disallowing outbound SMB and WEBDAV access (at the firewall) to prevent users from making preloading connections out to the Internet. This is a solid recommendation, but more in terms of general guidance instead of specifically to this issue. The problem is that a malicious user could simply zip up the affected document with a copy of the dll and the user would be able to load it locally - hdmoore provides an audit kit that even builds the dll a