User interaction is required to exploit this vulnerability.
The specific flaw exists within the handling of malformed strings within cai:// URIs. The '--launcher.library' switch can be injected and directed to load a DLL from a network share. This will result in code execution under the context of the current user.
Disclosure Timeline:
2009-12-18 - Vulnerability reported to vendor
2011-02-07 - Coordinated public release of advisory