Acros Security's 0patch team member Luka Treiber said this was the first time the company had issued code to fix a zero-day exploit.
He has provided a detailed rundown of his methodology on the firm's website.
Anyone wishing to use the patch has to download 0patch's patching agent and then obtain the code.
It was made public by a Google researcher soon after Microsoft cancelled the issue of security updates for February, giving no reason for it.
The library, gdi32.dll, enables applications to use graphics and formatted text on both the video display and the printer.
"I have confirmed that the vulnerability reproduces both locally in Internet Explorer, and remotely in Office Online, via a .docx document containing the specially crafted EMF file," security researcher Mateusz Jurczyk wrote at the time.
When Microsoft was asked for comment about Google's actions, it responded: "Windows is the only platform with a customer commitment to investigate reported security issues, and proactively update impacted devices.
"Our standard policy is to provide solutions via our current Update Tuesday schedule."