I spent a some time 2 days ago on this, and I found
a) Our current installation of Eset's Nod32 (EAVBE, 4.2.40.0) quarantines the sample script - so I'd like to presume that it would protect you from an attempt to exploit - and I would like to assume that the retail version would to, although I didn't test it.
b) NoScript (with Firefox) will mitigate this, in that you have to enable scripting from the exploitive web site before it can run
c) removing npdeploykt.dll (or replacing it with another innocuous dll, which is what I did administratively to all of the workstations at work) prevents the exploit from deploying.
Also, I noticed that Java has released a new patch release (6.20) overnight - I'd like to assume that this is fixed, but haven't had time to confirm that.
<S>
Guy