A lot of SMS Admins I speak too are telling me they are flat out getting MS08-067 rolled in to their environments. Great work guys, most are very responsive and understand the importance of getting it bedded in.

Rolling this puppy out is definately a good idea, especially considering that the exploit code has now gone public. We'll be seeing all kinds of methods (malware!) being employed to compromise systems inside firewalled environments.

I'd strongly urge you to accelerate your patch planning, and if you are holding out until the next patch cycle, wrong ...

The MSRC (Microsoft Security Response Center) posted more information about the problem a few days ago. Keeping an eye on Chris Mosby's blog is a good idea, as he's a good source of updates on this.