Adobe's playing this one very close to the chest -- I've seen no details about the hole on any of the usual hacking sites. The security bulletin says, "Adobe actively shares information about this and other vulnerabilities with partners in the security community to enable them to quickly develop detection and quarantine methods to protect users until a patch is available." It could be -- but if true, none of that information has leaked, at least as of this writing.
The authoritative SANS Internet Storm Center doesn't pull any punches:
Keep an eye out for this one folks. It will take a bit for the anti-virus, IDS/IPS and other vendors to catch up and detect the malware that exploits the vulnerability. Although by that point the box affected may well be compromised as most detect after the exploit has already taken place. Since the vendor has released the advisory after being notified that exploits are already occurring against Windows boxes it is recommended to explore workarounds for mitigation, detection of already compromised hosts, and cleanup
Flash -- it's the player that keeps on giving.
This article, "Another day, another Flash zero-day vulnerability," was originally published at InfoWorld.com. Get the first word on what the important tech news really means with the InfoWorld Tech Watch blog.