Thursday, 10 June 2010

Microsoft Patch Tuesday - June 2010

With this June Microsoft Patch Tuesday Security Update, we see a larger number security updates with 10 updates to Windows XP and Windows 7 desktops including 3 updates rated as Critical, 6 rated as Important and one patch update that has a Microsoft rating of Tampering. Unfortunately, all patches released this month will most likely require a reboot of the target system.
The ChangeBase AOK Patch Impact team has updated the sample application database with more unique application packages. All of the applications in this large sample application portfolio are analyzed for application level conflicts with Microsoft Security Updates and potential dependencies.

Based on the results of our AOK Application Compatibility Lab several of the June Patch Tuesday updates are likely to require extensive application level testing including;


  • MS10-033 Vulnerabilities in Media Decompression Could Allow Remote Code
  • MS10-035 Cumulative Security Update for Internet Explorer
  • MS10-036 Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution
  • MS10-041 Vulnerability in Microsoft .NET Framework Could Allow Tampering


We have included a brief snap-shot of some of the results from our AOK Software that demonstrates some of the potential impacts on the OSP application package with the first image below. In addition to this high level summary, we have also included a small sample of one of the AOK Summary reports from a smaller sample database (second image below).









Testing Summary
  • MS10-032 : "Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (979559)"
  • MS10-033 : "Vulnerabilities in Media Decompression Could Allow Remote Code Execution (979902)"
  • MS10-034 : "Cumulative Security Update of ActiveX Kill Bits (980195)"
  • MS10-035 : "Cumulative Security Update for Internet Explorer (982381)"
  • MS10-036 : "Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution (983235)"
  • MS10-037 : "Vulnerability in the Compact Font Format Driver Could Allow Elevation of Privilege (980218)"
  • MS10-038 : "Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (2027452)"
  • MS10-039 : "Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege (2028554)"
  • MS10-040 : "Vulnerability in Internet Information Services Could Allow Remote Code Execution (982666)"
  • MS10-041 : "Vulnerability in Microsoft .NET Framework Could Allow Tampering (981343)"


Patch NameTotal
Issues
Matches
Affected
RebootRatingRAG
Microsoft Security Bulletin MS10-032<1%<1%YESGreen
Microsoft Security Bulletin MS10-03313%10%YESAmber
Microsoft Security Bulletin MS10-034<1%<1%YESGreen
Microsoft Security Bulletin MS10-035<6%<9%YESAmber
Microsoft Security Bulletin MS10-036<7%<9%YESAmber
Microsoft Security Bulletin MS10-037<1%<1%YESGreen
Microsoft Security Bulletin MS10-038<5%<8%YESAmber
Microsoft Security Bulletin MS10-039<1%<1%YESGreen
Microsoft Security Bulletin MS10-040<1%<1%YESGreen
Microsoft Security Bulletin MS10-0412%1%YESAmber

Legend:
No IssueNo Issues Detected
FixablePotentially fixable application Impact
SeriousSerious Compatibility Issue

Security Update Detailed Summary
MS10-032Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (979559)
DescriptionThis security update resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in the Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if a user views content rendered in a specially crafted TrueType font.
PayloadWin32k.sys
ImpactElevation of Privilege

MS10-033Vulnerabilities in Media Decompression Could Allow Remote Code Execution (979902)
DescriptionThis security update resolves two privately reported vulnerabilities in Microsoft Windows. These vulnerabilities could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
PayloadAsycfilt.dll, Quartz.dll
ImpactRemote Code Execution

MS10-034Cumulative Security Update of ActiveX Kill Bits (980195)
DescriptionThis security update addresses two privately reported vulnerabilities for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003, Windows Server2008, and Windows Server 2008 R2.
PayloadN/A
ImpactRemote Code Execution

MS10-035Cumulative Security Update for Internet Explorer (982381)
DescriptionThis security update resolves five privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
PayloadIecustom.dll, Browseui.dll, Cdfview.dll, Danim.dll, Dxtmsft.dll, Dxtrans.dll, Iepeers.dll, Inseng.dll, Jsproxy.dll, Mshtml.dll, Msrating.dll, Mstime.dll, Pngfilt.dll, Shdocvw.dll, Shlwapi.dll, Tdc.ocx, Urlmon.dll, Wininet.dll, Browseui.dll, Cdfview.dll, Danim.dll, Dxtmsft.dll, Dxtrans.dll, Iepeers.dll, Inseng.dll, Jsproxy.dll, Mshtml.dll, Msrating.dll, Mstime.dll, Pngfilt.dll, Shdocvw.dll, Shlwapi.dll, Tdc.ocx, Urlmon.dll, Wininet.dll, Iecustom.dll
ImpactRemote Code Execution

MS10-036Vulnerability in COM Validation in Office Could Allow Remote Code Execution (983235)
DescriptionThis security update resolves a privately reported vulnerability in COM validation in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Excel, Word, Visio, Publisher, or PowerPoint file with an affected version of Microsoft Office. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful a user must open an attachment that is sent in an e-mail message.
PayloadMso.dll
ImpactRemote Code Execution

MS10-037Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege (980218)
DescriptionThis security update resolves a privately reported vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.
PayloadAtmfd.dll
ImpactElevation of Privilege

MS10-038Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (2027452)
DescriptionThis security update resolves fourteen privately reported vulnerabilities in Microsoft Office. The more severe vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
PayloadExcel.exe, excel.man, xlcall32.dll
ImpactRemote Code Execution

MS10-039Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege (2028554)
DescriptionThis security update resolves one publicly disclosed and two privately reported vulnerabilities in Microsoft SharePoint. The most severe vulnerability could allow elevation of privilege if an attacker convinced a user of a targeted SharePoint site to click on a specially crafted link.
PayloadA0000001.apx.x86, Acsacnt.apx.x86, Activecrawls_dwp.x86, Addcs.apx.x86, Addfedl.apx.x86, Addshr.apx.x86, Addsnm.apx.x86, Addtype.apx.x86, Admcmds.xml.x86, Admmap.apx.x86, Aeldark.gif.x86, Aellght.gif.x86, Aerdark.gif.x86, Aerlght.gif.x86, Aldark.gif.x86, Allght.gif.x86, Anllnkft.xml, Anluslnk.xml, Anlytics.sql, Application_registry.sql, Ardark.gif.x86, Arlght.gif.x86, Bb.apx.x86, Bdcph.dll, Blckvert.mst, Blglsbnd.mst, Blkband.mst, Blksingl.mst, Blueband.mst, Bluegrad.jpg.x86, Bluetabs.mst, Bluevert.mst, Bmossext.css, Brmossext.css, Brthafho.gif, Brthafin.jpg, Brthapfac.gif, Brthprbk.gif, Brthptabh.jpg, Brthptabsl.gif, Brthsgr.jpg.x86, Bsstap_xml.x86, Bthafho.gif, Bthafin.jpg, Bthapfac.gif, Bthprbk.gif, Bthptabh.jpg, Bthptabsl.gif, Bthsgr.jpg.x86, Categ.apx.x86, Cformsec.acx.x86, Chkmark.gif.x86, Cmossext.css, Compcrawls_dwp.x86, Cpyfedl.apx.x86, Crprop.apx.x86, Cthafho.gif, Cthafin.jpg, Cthapfac.gif, Cthprbk.gif, Cthptabh.jpg, Cthptabsl.gif, Cthsgr.jpg.x86, Ctmossext.css, Ctthafho.gif, Ctthafin.jpg, Ctthapfac.gif, Ctthprbk.gif, Ctthptabh.jpg, Ctthptabsl.gif, Ctthsgr.jpg.x86, Dbfrmsec.acx.x86, Deprpt.asx, Docxhtml.xsl, Docxpageconverter.exe, Dssplnk_xml.x86, Editcs.apx.x86, Editprofilelayouts.aspx, Editrule.apx.x86, Editsch.apx.x86, Edtfedl.apx.x86, Edtrelst.apx.x86, Enblalrt.apx.x86, Enhsrch.apx.x86, Expfedl.apx.x86, Expicker.js, Failure.asx, Fbaconf.apx.x86, Fbaproxy.apx.x86, Feabwapp.xml, Fldtypesspsbizdata_xml, Getsspsc.apx.x86, Gmgfelem.xml, Gmigfeat.xml, Gmossext.css, Grybult.gif.x86, Gthafho.gif, Gthafin.jpg, Gthapfac.gif, Gthprbk.gif, Gthptabh.jpg, Gthptabsl.gif, Gthsgr.jpg.x86, Hierarchytreeview.js, Htmlmenu.js, Impfedl.apx.x86, Impfile.gif.x86, Indxsec.asc, Info.asx, Jmossext.css, Jthafho.gif, Jthafin.jpg, Jthapfac.gif, Jthprbk.gif, Jthptabh.jpg, Jthptabsl.gif, Jthsgr.jpg.x86, Korwbrkr.dll.x86, Kword.apx.x86, Laymap.apx.x86, Limossext.css, Lithafho.gif, Lithafin.jpg, Lithapfac.gif, Lithprbk.gif, Lithptabh.jpg, Lithptabsl.gif, Lithsgr.jpg.x86, Lmossext.css, Loading.gif.x86, Logsmry.apx.x86, Logvwr.apx.x86, Lstcs.apx.x86, Lstkw.apx.x86, Lstsnm.apx.x86, Lthafho.gif, Lthafin.jpg, Lthapfac.gif, Lthprbk.gif, Lthptabh.jpg, Lthptabsl.gif, Lthsgr.jpg.x86, Mchrule.apx.x86, Microsoft.office.server.dll, Microsoft.office.server.dll_isapi, Microsoft.office.server.native.dll, Microsoft.office.server.ui.dll, Microsoft.sharepoint.publishing.dll_isapi, Mngfedl.apx.x86, Mngrules.apx.x86, Mngserv.apx.x86, Mngshr.apx.x86, Mngssp.asx, Mngtypes.apx.x86, Mossext.css, Mprop.apx.x86, Mrulessp.apx.x86, Msgfilt.dll.x86, Mssbltr.jpg.x86, Mssbrtl.jpg.x86, Msscntrs.dll.x86, Mssdmn.exe.x86, Mssearch.exe.x86, Mssph.dll.x86, Mssrch.dll.x86, Msswelc.apx.x86, Mystlink_ascx, Natlang6.dll_osssearch.x86, Natlangnlsd0000.dll_osssearch.x86, Natlangnlsd0001.dll_osssearch.x86, Natlangnlsd0002.dll_osssearch.x86, Natlangnlsd0003.dll_osssearch.x86, Natlangnlsd0007.dll_osssearch.x86, Natlangnlsd0009.dll_osssearch.x86, Natlangnlsd000a.dll_osssearch.x86, Natlangnlsd000c.dll_osssearch.x86, Natlangnlsd000d.dll_osssearch.x86, Natlangnlsd000f.dll_osssearch.x86, Natlangnlsd0010.dll_osssearch.x86, Natlangnlsd0011.dll_osssearch.x86, Natlangnlsd0013.dll_osssearch.x86, Natlangnlsd0018.dll_osssearch.x86, Natlangnlsd0019.dll_osssearch.x86, Natlangnlsd001a.dll_osssearch.x86, Natlangnlsd001b.dll_osssearch.x86, Natlangnlsd001d.dll_osssearch.x86, Natlangnlsd0020.dll_osssearch.x86, Natlangnlsd0021.dll_osssearch.x86, Natlangnlsd0022.dll_osssearch.x86, Natlangnlsd0024.dll_osssearch.x86, Natlangnlsd0026.dll_osssearch.x86, Natlangnlsd0027.dll_osssearch.x86, Natlangnlsd002a.dll_osssearch.x86, Natlangnlsd0039.dll_osssearch.x86, Natlangnlsd003e.dll_osssearch.x86, Natlangnlsd0045.dll_osssearch.x86, Natlangnlsd0046.dll_osssearch.x86, Natlangnlsd0047.dll_osssearch.x86, Natlangnlsd0049.dll_osssearch.x86, Natlangnlsd004a.dll_osssearch.x86, Natlangnlsd004b.dll_osssearch.x86, Natlangnlsd004c.dll_osssearch.x86, Natlangnlsd004e.dll_osssearch.x86, Natlangnlsd0414.dll_osssearch.x86, Natlangnlsd0416.dll_osssearch.x86, Natlangnlsd0816.dll_osssearch.x86, Natlangnlsd081a.dll_osssearch.x86, Natlangnlsd0c1a.dll_osssearch.x86, Natlangnlsg0009.dll_osssearch.x86, Natlangnlsl0001.dll_osssearch.x86, Natlangnlsl0002.dll_osssearch.x86, Natlangnlsl0003.dll_osssearch.x86, Natlangnlsl0007.dll_osssearch.x86, Natlangnlsl0009.dll_osssearch.x86, Natlangnlsl000a.dll_osssearch.x86, Natlangnlsl000c.dll_osssearch.x86, Natlangnlsl000d.dll_osssearch.x86, Natlangnlsl000f.dll_osssearch.x86, Natlangnlsl0010.dll_osssearch.x86, Natlangnlsl0011.dll_osssearch.x86, Natlangnlsl0013.dll_osssearch.x86, Natlangnlsl0018.dll_osssearch.x86, Natlangnlsl0019.dll_osssearch.x86, Natlangnlsl001a.dll_osssearch.x86, Natlangnlsl001b.dll_osssearch.x86, Natlangnlsl001d.dll_osssearch.x86, Natlangnlsl0020.dll_osssearch.x86, Natlangnlsl0021.dll_osssearch.x86, Natlangnlsl0022.dll_osssearch.x86, Natlangnlsl0024.dll_osssearch.x86, Natlangnlsl0026.dll_osssearch.x86, Natlangnlsl0027.dll_osssearch.x86, Natlangnlsl002a.dll_osssearch.x86, Natlangnlsl0039.dll_osssearch.x86, Natlangnlsl003e.dll_osssearch.x86, Natlangnlsl0045.dll_osssearch.x86, Natlangnlsl0046.dll_osssearch.x86, Natlangnlsl0047.dll_osssearch.x86, Natlangnlsl0049.dll_osssearch.x86, Natlangnlsl004a.dll_osssearch.x86, Natlangnlsl004b.dll_osssearch.x86, Natlangnlsl004c.dll_osssearch.x86, Natlangnlsl004e.dll_osssearch.x86, Natlangnlsl0414.dll_osssearch.x86, Natlangnlsl0416.dll_osssearch.x86, Natlangnlsl0816.dll_osssearch.x86, Natlangnlsl081a.dll_osssearch.x86, Natlangnlsl0c1a.dll_osssearch.x86, Natlangnlsm0011.dll_osssearch.x86, Noisecsy.txt.x86, Noisedan.txt.x86, Notesph.dll.oss.x86, Offfiltx.dll.x86, Omossext.css, Orgsingl.mst, Osafehtm.dll, Osrvintl.dll, Oss.dwpcoreresults_dwp.x86, Oss.dwpsearchstats_dwp.x86, Oss.intl.dll.x86, Oss.korwbrkr.lex.x86, Oss.searchresults_aspx, Oss.searchserverwizard.feature.xml.x86, Oss.srch.rsx.x86, Oss.srchadm.rsx.x86, Oss.srchrssgen_xsl, Oss.srchrss_aspx, Oss.ssp.adminlinks.xml.x86, Oss.ssp.feature.xml.x86, Oss.summaryresults_dwp.x86, Oss.swpf.coreresults_dwp.x86, Oss.swpf.searchstats_dwp.x86, Oss.swpf.summaryresults_dwp.x86, Oss.swpf.topanswer_dwp.x86, Oss.topanswer_dwp.x86, Oss.upgrade.config.xml.x86, Ossadm.xml, Osspreupgradecheck.xml.x86, Osssearchadmin_helpkeymap.xml, Othafho.gif, Othafin.jpg, Othapfac.gif, Othprbk.gif, Othptabh.jpg, Othptabsl.gif, Othsgr.jpg.x86, Personalxmlonet_xml, Pkmexsph.dll_0001.x86, Plmossext.css, Plthafho.gif, Plthafin.jpg, Plthapfac.gif, Plthprbk.gif, Plthptabh.jpg, Plthptabsl.gif, Plthsgr.jpg.x86, Pmossext.css, Portal.dll, Portal.dll_001, Profilesrp.sql, Profilup.sql, Prtlayfeature.xml, Prtlayfiles.xml, Pthafho.gif, Pthafin.jpg, Pthapfac.gif, Pthprbk.gif, Pthptabh.jpg, Pthptabsl.gif, Pthsgr.jpg.x86, Pubtfeat.xml, Query9x.dll_0001.x86, Reportcenterdoclibschema_xml, Reportcenterxmlonet_xml, Resrem.apx.x86, Rlschma.xml, Rmossext.css, Rthafho.gif, Rthafin.jpg, Rthapfac.gif, Rthprbk.gif, Rthptabh.jpg, Rthptabsl.gif, S2addshr.apx.x86, S2afeat_xml.x86, S2bssta_xml.x86, S2dash.apx.x86, S2dashp_xml.x86, S2dwpp_xml.x86, S2farm.apx.x86, S2mngshr.apx.x86, S2safea_xml.x86, Schema.apx.x86, Schema.xml_dcl, Schema.xml_ldoclib, Schema.xml_pubfeap, Schma.xml, Schreset.apx.x86, Sclonet_xml.x86, Scope.apx.x86, Scpdspgp.apx.x86, Scssp.apx.x86, Scxmlonet_xml.x86, Sdefault_aspx.x86, Sdsgpssp.apx.x86, Search.web.parts.dwpfiles.xml.x86, Search.web.parts.feature.xml.x86, Searchmain.aspx.x86, Searchom.dll.x86, Searchom.dll_0001.x86, Searchres.aspx.x86, Selcrpr.apx.x86, Selmpr.apx.x86, Sharepointpub.dll, Sharepointpub_gac.dll, Smafho.gif, Smafin.jpg, Smapfac.gif, Smmossext.css, Smossext.css, Smprbk.gif, Smpsgr.jpg.x86, Smptabh.jpg, Smptabsl.gif, Sppubint.dll, Sppubint_gac.dll, Sps.core.rsx, Sps.rsx, Spscore.rsx_1025, Spscore.rsx_1026, Spscore.rsx_1027, Spscore.rsx_1028, Spscore.rsx_1029, Spscore.rsx_1030, Spscore.rsx_1031, Spscore.rsx_1032, Spscore.rsx_1033, Spscore.rsx_1035, Spscore.rsx_1036, Spscore.rsx_1037, Spscore.rsx_1038, Spscore.rsx_1040, Spscore.rsx_1041, Spscore.rsx_1042, Spscore.rsx_1043, Spscore.rsx_1044, Spscore.rsx_1045, Spscore.rsx_1046, Spscore.rsx_1048, Spscore.rsx_1049, Spscore.rsx_1050, Spscore.rsx_1051, Spscore.rsx_1053, Spscore.rsx_1054, Spscore.rsx_1055, Spscore.rsx_1058, Spscore.rsx_1060, Spscore.rsx_1061, Spscore.rsx_1062, Spscore.rsx_1063, Spscore.rsx_1081, Spscore.rsx_2052, Spscore.rsx_2070, Spscore.rsx_2074, Spscore.rsx_3082, Spsimpph.dll.x86, Spsintl.dll, Srchfarm.apx.x86, Srchipp.dll.x86, Srcsicon.apx.x86, Srcsiset.apx.x86, Sresults_aspx.x86, Srponet.xml, Ssocli.dll_0001, Ssocli.dll_0002, Ssoom.dll, Ssoom.dll_001, Ssoperf.dll, Ssosrv.exe_0001, Ssplginf.apx.x86, Sspsett.apx.x86, Sspstat.apx.x86, Sthafho.gif, Sthafin.jpg, Sthapfac.gif, Sthprbk.gif, Sthptabh.jpg, Sthptabsl.gif, Stsadmcommands.portal.xml, Subsys_dwp.x86, Succes.asx, Susglnk_xml.x86, Svrsetup.dll, Svrsetup.exe, Sysstat_dwp.x86, Thafho.gif, Thafin.jpg, Thapfac.gif, Thprbk.gif, Thptabh.jpg, Thptabsl.gif, Thsgr.jpg.x86, Tquery.dll.x86, Tscsy.xml.x86, Updsched.apx.x86, Upgrade.dll_001, Uschdssp.apx.x86, Usgconfg.aspx, Usgsitsq.aspx, Usgsitsx.aspx, Usgsspsq.aspx, Usgsspsr.aspx, V3dwptopsiteswp_dwp, Vimossext.css, Vithafho.gif, Vithafin.jpg, Vithapfac.gif, Vithprbk.gif, Vithptabh.jpg, Vithptabsl.gif, Vithsgr.jpg.x86, Vmossext.css, Vscpsssp.apx.x86, Vssetssp.apx.x86, Vthafho.gif, Vthafin.jpg, Vthapfac.gif, Vthprbk.gif, Vthptabh.jpg, Vthptabsl.gif, Vthsgr.jpg.x86, Vwscopes.apx.x86, Vwscpset.apx.x86, Warning.asx, Webconfig.spss.xml.x86, Wmossext.css, Wpdwpfiles.xml, Wthafho.gif, Wthafin.jpg, Wthapfac.gif, Wthprbk.gif, Wthptabh.jpg, Wthptabsl.gif, Wthsgr.jpg.x86
ImpactElevation of Privilege

MS10-040Vulnerability in Internet Information Services Could Allow Remote Code Execution (982666)
DescriptionThis security update resolves a privately reported vulnerability in Internet Information Services (IIS). The vulnerability could allow remote code execution if a user received a specially crafted HTTP request. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
PayloadHttp.sys, Httpapi.dll, Strmfilt.dll, W3core.dll, W3dt.dll, W3isapi.dll, Whttpapi.dll, Wstrmfilt.dll, Ww3core.dll, Ww3dt.dll, Ww3isapi.dll, Http.sys, Httpapi.dll, Strmfilt.dll, W3core.dll, W3dt.dll, W3isapi.dll, Whttpapi.dll, Wstrmfilt.dll, Ww3core.dll, Ww3dt.dll, Ww3isapi.dll
ImpactRemote Code Execution

MS10-041Vulnerability in Microsoft .NET Framework Could Allow Tampering (981343)
DescriptionThis security update resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow data tampering in signed XML content without being detected. In custom applications, the security impact depends on how the signed content is used in the specific application. Scenarios in which signed XML messages are transmitted over a secure channel (such as SSL) are not affected by this vulnerability.
Payloadaspnet_filter.dll, aspnet_isapi.dll, aspnet_wp.exe, CORPerfMonExt.dll, mscoree.dll, mscorees.dll, mscorie.dll, mscorjit.dll, mscorld.dll, mscorlib.dll, mscorsn.dll, mscorsvr.dll, System.dll, System.Security.dll, mscorlib.ldo, mscorwks.dll, System.Web.dll, System.ldo
ImpactTampering


*All results are based on an AOK Application Compatibility Lab’s test portfolio of over 1,000 applications.

No comments: