eEye has released a patch for the active IE vulnerability.
Organizations that choose to employ this workaround should take the steps required to uninstall it once the official Microsoft patch is released. This workaround is not meant to replace the forthcoming Microsoft patch, rather it is intended as a temporary protection against this flaw. Organizations should only install this patch if they are not able to disable Active Scripting as a means of mitigation [my emphasis].
Read more and download here
But small comment, don’t bother using this patch — Disable Active Scripting Support in IE is a valid mitigator.