Yeah m8 i did i also looked at there trac and changes they made.I don't do allot of open source exploit development it felt like a new challenge to broaden my knowledge of exploit development and debugging and welcomed the challenge to get execution of shell code on vista sp1.
The fix by the developers can be found here.
http://www.securityfocus.com/bid/34334/references And i come away from this exploit with allot of learning which im happy about :).
Another funny thing is i found a really nice buffer overflow in the last version of opera and never shared any information.
This was because when i found the opera torrent buffer overflow some security company jumped on it and claimed credits for it even after mine was released :).
But i realized in the new release some changes had been made behind closed doors and struggle to replicate the buffer overflow although im still looking into the exception :).