As of January 22, Adobe has released a patch for a zero day exploit for Flash. Details are available at
http://helpx.adobe.com/security/products/flash-player/apsb15-02.html
The flash version that should address the vulnerability is 16.0.0.287.
Details for the flash update for Internet Explorer are available at https://technet.microsoft.com/en-us/library/security/2755801.aspx
Extract from Microsoft Announcement.
On January 22, 2015, Microsoft released an update (3033408) for Internet Explorer 10 on Windows 8, Windows Server 2012, Windows RT, and for Internet Explorer 11 on Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows Technical Preview, and Windows Server Technical Preview. The update addresses the vulnerabilities described in Adobe Security bulletin APSB15-02. For more information about this update, including download links, see Microsoft Knowledge Base Article 3033408.
Update January 23 9:15 a.m.
According to an update on the Nakedsecurity.sophos.com site, a definition for the malware is currently available in Sophos
https://nakedsecurity.sophos.com/2015/01/23/adobe-issues-emergency-fix-for-flash-zero-day/
Note. Although the crooks can, and do, change their malware payloads at any time, the attacks currently [2015-01-23T09:30Z] associated with these zero-day threats seem to be a malware family called Troj/Bedep by Sophos products, delivered by an exploit kit component from the family Troj/SwfExp. The Angler exploit kit mentioned above is variously detected using the family names Mal/ExpJS and Troj/JSRedir.
Update January 26 7:30 a.m.
A second patch for another zero day vulnerability is in the process of being distributed. The updated version is identified as 16.0.0.296 and will be distributed starting on Saturday, January 24. The Adobe security update page does not have much in the way of details as of 1/26. However, what is currently known can be viewed on http://helpx.adobe.com/security/products/flash-player/apsa15-01.html