US-CERT recommends users and administrators review theMicrosoft Security Advisoryand apply the recommended workarounds.
Meanwhile in a separate report,McAfeehas said that this zero-day exploit is a part of theSandworm.
The Operation Sandworm was discovered by iSIGHT Partners and allocated CVE-2014-4114.
However, Microsoft apparently botched up the patch released for the original Operation Sandworm zero-day exploit, the CVE-2014-4114.
The botch up revealed another zero-day which is now identified as CVE-2014-6352.
In other words, attackers might still be able to exploit the vulnerability even after the patch is applied.
Since then we have actively worked with Microsoft to clear this jam.
Preparing EMET requires adding a new configuration file to the standard one.
source: www.techworm.net