Microsoft Visual Studio is prone to a remote code-execution vulnerability in the Active Template Library (ATL). Remote attackers can exploit this issue to execute arbitrary code with the privileges of the user running an application built with the affected library.
Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.
Do not follow links provided by unknown or untrusted sources.
To reduce the likelihood of successful exploits, never visit sites of questionable integrity or follow links provided by unfamiliar or untrusted sources.
Implement multiple redundant layers of security.
Memory-protection schemes (such as nonexecutable stack and heap configurations and randomly mapped memory segments) may complicate exploit attempts.
The vendor has released an advisory and fixes. Please see the references for details.