DeutschEspañolFrançaisItalianoNederlandsPortuguêsΕλληνικάРусскийالعربية中文(简体)中文(繁體)日本語한국어
 
Donate Bitcoins
Google
 
www smithii.com
 

Automatically Slipstream Windows XP with SP2 and All Post-SP2 Security Hotfixes with a Single Command (Updated 03-May-09)

For information about slipstreaming Windows XP SP3, visit http://smithii.com/slipstream_xpsp3.

I've written the batch file xpsp2.cmd (updated 03-May-09) to automatically download and slipstream a standard Windows XP boot disk with Service Pack 2 and all post-SP2 security hotfixes.

It uses wget or curl (if either are found in the PATH), or your installed browser to download the updates. I have tested this with Internet Explorer, Firefox, and Opera. Other browsers should work, as well.

The batch file xpsp2local.cmd (updated 03-May-09) will update the copy of Windows XP that is installed on the computer you run the command on. You may wish to do this, if you do not have, or want, the machine you want to hotfix connected to the internet, or if you are unable to run Windows Update for some reason (for example, if Internet Explorer isn't installed, or doesn't work properly, due to a virus or similar mishap).

To slipstream the hotfixes, and burn the slipstreamed disk, I've created the makefile xpsp2.mak (updated 03-May-09). Details on usage below.

Microsoft XML Core Services Hotfixes

For Microsoft XML Core Services, run msxml_hotfixes.cmd (updated 24-Aug-07) to install the latest hotfixes locally.

Microsoft Office 2003 SP2 and Hotfixes

For Office 2003, run office_2003_hotfixes.cmd (updated 25-Aug-07) to install Service Pack 2, and all post-SP2 hotfixes locally.

The xpsp2* scripts listed above include the following security updates found at http://www.microsoft.com/technet/security/current.aspx:


Apr 09:

MS09-010 - Critical
Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code Execution (960477)
KB923561
SP2: replaces none
SP3: replaces none

MS09-013 - Critical
Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution (960803)
SP2: replaces none
SP3: replaces none

MS09-011 - Critical
Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (961373)
SP2: replaces MS08-033
SP3: replaces MS08-033

MS09-014 - Critical
Cumulative Security Update for Internet Explorer (963027)
SP2: replaces MS08-073, MS08-078
SP3: replaces MS08-073, MS08-078

MS09-012 - Important
Vulnerabilities in Windows Could Allow Elevation of Privilege (959454)
SP2: replaces MS07-022, MS08-002, MS08-064
SP3: replaces MS08-064

MS09-015 – Moderate
Blended Threat Vulnerability in SearchPath Could Allow Elevation of Privilege (959426)
SP2: replaces MS07-035
SP2: replaces MS07-035

Mar 09:

MS09-006 – Critical
Vulnerabilities in Windows Kernel Could Allow Remote Code Execution (958690)
SP2: replaces MS08-061
SP3: replaces MS08-061

MS09-007 - Important
Vulnerability in SChannel Could Allow Spoofing (960225)
SP2: replaces MS07-031
SP3: replaces none

Feb 09:

Jan 09:

MS09-001 – Critical
Vulnerabilities in SMB Could Allow Remote Code Execution (958687)
SP2: replaces MS08-063
SP3: replaces MS08-063

Dec 08:

MS08-071 – Critical
Vulnerabilities in GDI Could Allow Remote Code Execution (956802)
SP2: replaces MS08-021
SP3: replaces none

MS08-073 - Critical
Cumulative Security Update for Internet Explorer (958215)
SP2: replaces MS08-058
SP3: replaces MS08-058

MS08-076 – Important
Vulnerabilities in Windows Media Components Could Allow Remote Code Execution (959807)
SP2: replaces none
SP3: replaces none

MS08-078 - Critical
Security Update for Internet Explorer (960714)
SP2: replaces none
SP3: replaces none

Nov 08:

MS08-068 | Important
Vulnerability in SMB Could Allow Remote Code Execution (957097)
SP2: replaces MS05-011
SP3: replaces none

MS08-069 | Critical
Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (955218)
SP2: replaces MS06-042
SP3: replaces none

Oct 08:

MS08-058 - Critical
Cumulative Security Update for Internet Explorer (956390)
SP2: replaces MS08-045
SP3: replaces MS08-045

MS08-061 – Important
Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (954211)
SP2: replaces MS08-025
SP3: replaces none

MS08-062 - Important
Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution (953155)
SP2: replaces none
SP3: replaces none

MS08-063 – Important
Vulnerability in SMB Could Allow Remote Code Execution (957095)
SP2: replaces MS06-063
SP3: replaces none

MS08-064 – Important
Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege (956841)
SP2: replaces MS07-022
SP3: replaces none

MS08-066 – Important
Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege (956803)
SP2: replaces none
SP3: replaces none

MS08-067 – Critical
Vulnerability in Server Service Could Allow Remote Code Execution (958644)
SP2: replaces MS06-040
SP3: replaces none

Sep 08:

MS08-052 - Critical
Vulnerabilities in GDI+ Could Allow Remote Code Execution (954593)
SP2: replaces none
SP3: replaces none

MS08-053 - Critical
Vulnerability in Windows Media Encoder 9 Could Allow Remote Code Execution (954156)
SP2: replaces none
SP3: replaces none

MS08-054 - Critical
Vulnerability in Windows Media Player Could Allow Remote Code Execution (954154)
SP2: replaces none
SP3: replaces none

Aug 08:

MS08-045 - Critical
Cumulative Security Update for Internet Explorer (953838)
SP2: replaces MS08-031
SP3: replaces MS08-031

MS08-046 - Critical
Vulnerability in Microsoft Windows Image Color Management System Could Allow Remote Code Execution (952954)
SP2: replaces none
SP3: replaces none

MS08-048 - Important
Security Update for Outlook Express and Windows Mail (951066)
SP2: replaces none
SP3: replaces none

MS08-049 - Important
Vulnerabilities in Event System Could Allow Remote Code Execution (950974)
SP2: replaces none
SP3: replaces none

MS08-050 - Important
Vulnerability in Windows Messenger Could Allow Information Disclosure (955702)
SP2: replaces none
SP3: replaces none

Jul 08:

MS08-037 - Important
Vulnerabilities in DNS Could Allow Spoofing (953230)
SP2: replaces MS06-064, MS08-001
SP3: replaces none

Jun 08:

MS08-030 - Critical
Vulnerability in Bluetooth Stack Could Allow Remote Code Execution (951376)
SP2: replaces none
SP3: replaces none

MS08-031 - Critical
Cumulative Security Update for Internet Explorer (950759)
SP2: replaces MS08-024
SP3: replaces none
replaced by MS08-45

MS08-032 - Moderate
Cumulative Security Update of ActiveX Kill Bits (950760)
SP2: replaces MS08-023
SP3: replaces none

MS08-033 - Critical
Vulnerabilities in DirectX Could Allow Remote Code Execution (951698)
SP2: replaces MS07-064
SP3: replaces none

MS08-035 - Important
Vulnerability in Active Directory Could Allow Denial of Service (953235)
SP2: replaces MS08-003
SP3: replaces none

MS08-036 - Important
Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service (950762)
SP2: replaces MS06-052
SP3: replaces none
  1. KB941693: MS08-025: Vulnerability in Windows Kernel Could Allow Elevation of Privilege Release 08-Apr-08 (Important)
  2. KB944338: MS08-022: Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution Release 08-Apr-08 (Critical)
  3. KB948590: MS08-021: Vulnerabilities in GDI Could Allow Remote Code Execution Release 08-Apr-08 (Critical)
  4. KB945553: MS08-020: Vulnerability in DNS Client Could Allow Spoofing Release 08-Apr-08 (Important)
  5. <!-- Feb, 2008: http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx -->

  6. KB947890: MS08-008: Vulnerability in OLE Automation Could Allow Remote Code Execution Released 12-Feb-08 (Critical)
  7. KB946026: MS08-007: Vulnerability in WebDAV Mini-Redirector Could Allow Remote Code Execution Released 12-Feb-08 (Critical)
  8. KB942830: MS08-006: Vulnerability in Internet Information Services Could Allow Remote Code Execution Released 12-Feb-08 (Important)
  9. KB942831: MS08-005: Vulnerability in Internet Information Services Could Allow Elevation of Privilege Released 12-Feb-08 (Important)
  10. <!-- Jan, 2008: http://www.microsoft.com/technet/security/bulletin/ms08-jan.mspx -->

  11. KB943485: MS08-002: Vulnerability in LSASS Could Allow Local Elevation of Privilege Released 08-Jan-08 (Important)
  12. <!-- Dec, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-dec.mspx -->

  13. KB941569: MS07-068: Vulnerability in Windows Media File Format Could Allow Remote Code Execution Released 11-Dec-07 (Critical)
  14. KB944653: MS07-067: Vulnerability in Macrovision Driver Could Allow Local Elevation of Privilege Released 11-Dec-07 (Important)
  15. KB937894: MS07-065: Vulnerability in Message Queuing Could Allow Remote Code Execution Released 11-Dec-07 (Important)
  16. <!-- Nov, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-nov.mspx -->

  17. KB943460: MS07-061: Vulnerability in Windows URI Handling Could Allow Remote Code Execution Released 13-Nov-07 (Critical)
  18. <!-- Oct, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-oct.mspx -->

  19. KB933729: MS07-058: Vulnerability in RPC Could Allow Denial of Service Released 09-Oct-07 (Important)
  20. KB941202: MS07-056: Security Update for Outlook Express and Windows Mail Released 09-Oct-07 (Critical)
  21. KB923810: MS07-055: Vulnerability in Kodak Image Viewer Could Allow Remote Code Execution Released 09-Oct-07 (Critical)
  22. <!-- Aug, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-aug.mspx -->

  23. KB938127: MS07-050: Vulnerability in Vector Markup Language Could Allow Remote Code Execution Released 14-Aug-07 (Important)
  24. KB936782: MS07-047: Vulnerability in Windows Media Player Could Allow Remote Code Execution Released 14-Aug-07 (Critical)
  25. <!-- Jul, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-jul.mspx -->

  26. KB939373: MS07-041: Vulnerability in Microsoft Internet Information Services Could Allow Remote Code Execution Released 20-Jul-07 (Important)
  27. <!-- June, 2007: http://www.microsoft.com/technet/security/bulletin/ms10-jun.mspx -->

  28. KB935839: MS07-035: Vulnerability in Win32 API Could Allow Remote Code Execution Released 12-Jun-07 (Critical)
  29. KB929123: MS07-034: Cumulative Security Update for Outlook Express and Windows Mail Released 12-Jun-07 (Critical)
  30. KB935840: MS07-031: Vulnerability in the Windows Schannel Security Package Could Allow Remote Code Execution Released 12-Jun-07 (Critical)
  31. <!-- May, 2007: http://www.microsoft.com/technet/security/bulletin/ms10-may.mspx -->

    <!-- April, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-apr.mspx -->

  32. KB931784: MS07-022: Vulnerability in Windows Kernel Could Allow Elevation of Privilege Released 07-Apr-07 (Important)
  33. KB930178: MS07-021: Vulnerabilities in CSRSS Could Allow Remote Code Execution Released 07-Apr-07 (Critcal)
  34. KB932168: MS07-020: Vulnerability in Microsoft Agent Could Allow Remote Code Execution Released 07-Apr-07 (Critcal)
  35. KB931261: MS07-019: Vulnerability in Universal Plug and Play Could Allow Remote Code Execution Released 07-Apr-07 (Critcal)
  36. KB925902: MS07-017: Security Update for Windows XP Released 03-Apr-07 (Critcal)
  37. <!-- February, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-feb.mspx -->

  38. KB918118: MS07-013: Vulnerability in Microsoft RichEdit Could Allow Remote Code Execution Released 12-Feb-07 (Important)
  39. KB924667: MS07-012: Vulnerability in Microsoft MFC Could Allow Remote Code Execution Released 12-Feb-07 (Important)
  40. KB926436: MS07-011: Vulnerability in Microsoft OLE Dialog Could Allow Remote Code Execution (Important) Released 12-Feb-07 (Important)
  41. KB927779: MS07-009: Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution Released 12-Feb-07 (Critical)
  42. KB928843: MS07-008: Vulnerability in HTML Help ActiveX Control Could Allow Remote Code Execution Released 12-Feb-07 (Critical)
  43. KB927802: MS07-007: Vulnerability in Windows Image Acquisition Service Could Allow Elevation of Privilege Released 12-Feb-07 (Important)
  44. KB928255: MS07-006: Vulnerability in Windows Shell Could Allow Elevation of Privilege Released 12-Feb-07 (Important)
  45. <!-- December, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-dec.mspx -->

  46. KB926255: MS06-075: Vulnerability in Windows Could Allow Elevation of Privilege Released 12-Dec-06 (Important)
  47. KB926247: MS06-074: Vulnerability in SNMP Could Allow Remote Code Execution Released 12-Dec-06 (Important)
  48. <!-- November, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-nov.mspx -->

  49. KB924270: MS06-070: Vulnerability in Workstation Service Could Allow Remote Code Execution Released 14-Nov-06 (Critical)
  50. KB920213: MS06-068: Vulnerability in Microsoft Agent Could Allow Remote Code Execution Released 14-Nov-06 (Critical)
  51. KB923980: MS06-066: Vulnerabilities in Client Service for NetWare Could Allow Remote Code Execution Released 14-Nov-06 (Important)
  52. <!-- October, 2006: http://www.microsoft.com/technet/security/bulletin/ms08-oct.mspx -->

  53. KB924496: MS06-065: Vulnerability in Windows Object Packager Could Allow Remote Execution Released 10-Oct-06 (Moderate)
  54. KB923414: MS06-063: Vulnerability in Server Service Could Allow Denial of Service and Remote Code Execution Released 10-Oct-06 (Important)
  55. KB924191: MS06-061: Vulnerabilities in Microsoft XML Core Services could allow remote code execution Released 10-Oct-06 (Critical)
  56. KB923191: MS06-057: Vulnerability in Windows Explorer Could Allow Remote Execution Released 10-Oct-06 (Critical)
  57. <!-- September, 2006: http://www.microsoft.com/technet/security/bulletin/ms07-sep.mspx -->

  58. KB920685: MS06-053: Vulnerability in Indexing Service Could Allow Cross-Site Scripting Released 12-Sep-06 (Moderate)
  59. <!-- August, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-aug.mspx -->

  60. KB920670: MS06-050: Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution  Released 08-Aug-06 Important)
  61. KB920683: MS06-041: Vulnerability in DNS Resolution Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
  62. <!-- July, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-jul.mspx -->

  63. KB914388: MS06-036: Vulnerability in DHCP Client Service Could Allow Remote Code Execution Released 11-Jul-06 (Critical)
  64. <!-- June, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-jun.mspx -->

  65. KB914389: MS06-030: Vulnerability in Server Message Block Could Allow Elevation of Privilege Released 13-Jun-06 (Important)
  66. KB911280: MS06-025: Vulnerability in Routing and Remote Access Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
  67. KB918439: MS06-022: Vulnerability in ART Image Rendering Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
  68. <!-- May, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-may.mspx -->

  69. KB913580: MS06-018: Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of service Released 09-May-06 (Moderate)
  70. <!-- April, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-apr.mspx -->

  71. KB908531: MS06-015: Vulnerability in Windows Explorer Could Allow Remote Code Execution Released 11-Apr-06 (Updated 25-Apr-06) (Critical)
  72. KB911562: MS06-014: Vulnerability in Microsoft Data Access Components (MDAC) function could allow code execution Released 11-Apr-06 (Updated 11-May-06) (Critical)
  73. <!-- February, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-feb.mspx -->

  74. KB901190: MS06-009: Vulnerability in the Korean Input Method Editor (IME) could allow elevation of privilege Released 10-May-06 (Important)
  75. KB911927: MS06-008: Vulnerability in Web Client Service Could Allow Remote Code Execution Released 10-May-06 (Important)
  76. KB911564: MS06-006: Vulnerability in Windows Media Player Plug-in with Non-Microsoft Internet Browsers Could Allow Remote Code Execution Released 10-May-06 (Important)
  77. KB911565: MS06-005: Vulnerability in Windows Media Player 9 Could Allow Remote Code Execution Released 10-May-06 (Critical)
  78. <!-- January, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-jan.mspx -->

  79. KB908519: MS06-002: Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution Released 11-Jan-06 (Critical)
  80. <!-- November, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-nov.mspx -->

  81. KB902400: MS05-051: Vulnerabilities in MS DTC and COM+ could allow remote code execution Released 8-Nov-05 (Critical)
  82. <!-- October, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-oct.mspx -->

  83. KB900725: MS05-049: Vulnerabilities in the Windows shell could allow for remote code execution Released 29-Dec-05 (Important)
  84. KB901017: MS05-048: Vulnerability in the Microsoft Collaboration Data Objects Could Allow Remote Code Execution Released 29-Dec-05 (Important)
  85. KB905749: MS05-047: Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege Released 29-Dec-05 (Important)
  86. KB905414: MS05-045: Vulnerability in Network Connection Manager Could Allow Denial of Service Released 29-Dec-05 (Moderate)
  87. <!-- August, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-aug.mspx -->

  88. KB896423: MS05-043: Vulnerability in Print Spooler Service Could Allow Remote Code Execution Released 14-Aug-05 (Critical)
  89. KB899587: MS05-042: Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing Released 14-Aug-05 (Moderate)
  90. KB899591: MS05-041: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service Released 14-Aug-05 (Moderate)
  91. KB893756: MS05-040: Vulnerability in Telephony Service Could Allow Remote Code Execution Released 14-Aug-05 (Important)
  92. <!-- July, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-jul.mspx -->

  93. KB901214: MS05-036: Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution Released 12-Jul-05 (Critical)
  94. <!-- June, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-jun.mspx -->

  95. KB896428: MS05-033: Vulnerability in Telnet Client Could Allow Information Disclosure Released 14-Jun-05 (Moderate)
  96. KB890046: MS05-032: Vulnerability in Microsoft Agent Could Allow Spoofing Released 14-Jun-05 (Moderate)
  97. KB896358: MS05-026: Vulnerability in HTML Help Could Allow Remote Code Execution Released 14-Jun-05 (Critical)
  98. <!-- April, 2005 -->

  99. KB890859: MS05-018: Vulnerabilities in Windows kernel Could Allow Elevation of Privilege and Denial of Service Released 12-Apr-05 (Important)
  100. <!-- February, 2005 -->

  101. KB891781: MS05-013: Vulnerability in the DHTML Editing Component ActiveX Control Could Allow Code Execution Released 8-Feb-05 (Critical)
  102. KB887472: MS05-009: Vulnerability in PNG Processing Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
  103. KB888302: MS05-007: Vulnerability in Windows Could Allow Information Disclosure Released 8-Feb-05 (Important)
  104. <!-- December, 2004 -->

  105. KB885835: MS04-044: Vulnerabilities in Windows Kernel and LSASS Could Allow Elevation of Privilege Released 14-Dec-04 (Important)
  106. KB873339: MS04-043: Vulnerability in HyperTerminal Could Allow Code Execution Released 14-Dec-04 (Important)
  107. KB885836: MS04-041: A Vulnerability in WordPad Could Allow Code Execution Released 14-Dec-04 (Important)
  108. <!-- August, 2004 -->

  109. KB835935: Windows XP Service Pack 2 Released 24-Aug-04

<!-- ******************************************************************** -->
These updates are not included as they have been superceeded by a following update:
<!-- ******************************************************************** -->

  1. KB947864: MS08-024: Cumulative Security Update for Internet Explorer Release 08-Apr-08 (Critical)
  2. KB948881: MS08-023: Security Update of ActiveX Kill Bits Release 08-Apr-08 (Critical)
  3. KB944533: MS08-010: Cumulative Security Update for Internet Explorer Released 12-Feb-08 (Critical)
  4. KB946538: MS08-003: Vulnerability in Active Directory Could Allow Denial of Service Released 12-Feb-08 (Important)
  5. KB941644: MS08-001: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution Released 08-Jan-08 (Critical)
  6. KB938829: MS07-046: Vulnerability in GDI Could Allow Remote Code Execution Released 14-Aug-07 (Critical)
  7. KB942615: MS07-069: Cumulative Security Update for Internet Explorer Released 11-Dec-07 (Critical)
  8. KB941568: MS07-064: Vulnerabilities in DirectX Could Allow Remote Code Execution Released 11-Dec-07 (Critical)
  9. KB939653: MS07-057: Cumulative Security Update for Internet Explorer Released 09-Oct-07 (Critical)
  10. KB937143: MS07-045: Cumulative Security Update for Internet Explorer Released 14-Aug-07 (Critical)
  11. KB921503: MS07-043: Vulnerability in OLE Automation Could Allow Remote Code Execution Released 14-Aug-07 (Critical)
  12. KB933566: MS07-033: Cumulative Security Update for Internet Explorer Released 12-Jun-07 (Critical)
  13. KB931784: MS07-027: Cumulative Security Update for Internet Explorer Released 08-May-07 (Critical)
  14. KB928090: MS07-016: Cumulative Security Update for Internet Explorer Released 12-Feb-07 (Critical)
  15. KB929969: MS07-004: Vulnerability in Vector Markup Language Could Allow Remote Code Execution Released 09-Jan-07 (Critical)
  16. KB923689: MS06-078: Vulnerability in Windows Media Format Could Allow Remote Code Execution Released 12-Dec-06 (Critical)
  17. KB923694: MS06-076: Cumulative Security Update for Outlook Express Released 12-Dec-06 (Important)
  18. KB925454: MS06-072: Cumulative Security Update for Internet Explorer Released 12-Dec-06 (Critical)
  19. KB922760: MS06-067: Cumulative Security Update for Internet Explorer Released 14-Nov-06 (Critical)
  20. KB925486: MS06-055: Vulnerability in Vector Markup Language Could Allow Remote Code Execution Released 12-Sep-06 (Critical)
  21. KB922819: MS06-064: Vulnerabilities in TCP/IP IPv6 Could Allow Denial of Service Released 10-Oct-06 (Low)
  22. KB919007: MS06-052: Vulnerability in Reliable Multicast Program (PGM) Could Allow Remote Code Execution Released 12-Sep-06 (Important)
  23. KB917422: MS06-051: Vulnerability in Windows Kernel Could Result in Remote Code Execution Released 08-Aug-06 (Critical)
  24. KB922616: MS06-046: Vulnerability in HTML Help Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
  25. KB921398: MS06-045: Vulnerability in Windows Explorer Could Allow Remote Code Execution  Released 08-Aug-06 Important)
  26. KB920214: MS06-043: Vulnerability in Microsoft Windows Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
  27. KB918899: MS06-042: Cumulative Security Update for Internet Explorer Released 08-Aug-06 (Critical)
  28. KB921883: MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
  29. KB917159: MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution Released 11-Jul-06 (Critical)
  30. KB917537: MS06-034: Vulnerability in Microsoft Internet Information Services using Active Server Pages Could Allow Remote Code Execution Released 11-Jul-06 (Important)
  31. KB917953: MS06-032: Vulnerability in TCP/IP Could Allow Remote Code Execution Released 13-Jun-06 (Important)
  32. KB917734: MS06-024: Vulnerability in Windows Media Player Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
  33. KB917344: MS06-023: Vulnerability in Microsoft JScript Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
  34. KB916281: MS06-021: Cumulative Security Update for Internet Explorer Released 13-Jun-06 (Critical)
  35. KB913433: MS06-020: Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution Released 09-May-06 (Critical)
  36. KB911567: MS06-016: Cumulative Security Update for Outlook Express Released 11-Apr-06 (Important)
  37. KB912812: MS06-013: Cumulative Security Update for Internet Explorer Released 11-Apr-06 (Critical)
  38. KB913446: MS06-007: Vulnerability in TCP/IP Could Allow Denial of Service Released 10-May-06 (Important)
  39. KB912919: MS06-001: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution Released 6-Jan-06 (Critical)
  40. KB905915: MS05-054: Cumulative Security Update for Internet Explorer Released 13-Dec-05 (Critical)
  41. KB896424: MS05-053: Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution Released 8-Nov-05 (Critical)
  42. KB896688: MS05-052: Cumulative Security Update for Internet Explorer Released 29-Dec-05 (Critical)
  43. KB904706: MS05-050: Vulnerability in DirectShow Could Allow Remote Code Execution Released 29-Dec-05 (Critical)
  44. KB899589: MS05-046: Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution Released 29-Dec-05 (Important)
  45. KB899588: MS05-039: Vulnerability in Plug and Play Could Allow Remote Code Execution and Elevation of Privilege Released 14-Aug-05 (Critical)
  46. KB896727: MS05-038: Cumulative Security Update for Internet Explorer for Windows XP Service Pack 2 Released 14-Aug-05 (Critical)
  47. KB903235: MS05-037: Vulnerability in JView Profiler Could Allow Remote Code Execution Released 14-Aug-05 (Critical)
  48. KB890046: MS05-032: Vulnerability in Microsoft Agent Could Allow Spoofing Released 14-Jun-05 (Moderate)
  49. KB896422: MS05-027: Vulnerability in Server Message Block Could Allow Remote Code Execution Released 14-Jun-05 (Critical)
  50. KB883939: MS05-025: Cumulative Security Update for Internet Explorer Released 14-Jun-05 (Critical)
  51. KB890923: MS05-020: Cumulative security update for Internet Explorer Released 12-Apr-05 (Important)
  52. KB893086: MS05-016: Vulnerability in Windows Shell that Could Allow Remote Code Execution Released 12-Apr-05 (Critical)
  53. KB888113: MS05-015: Vulnerability in Hyperlink Object Library Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
  54. KB873333: MS05-012: Vulnerability in OLE and COM Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
  55. KB885250: MS05-011: Vulnerability in Server Message Block Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
  56. KB890047: MS05-008: Vulnerability in Windows shell could allow remote code execution Released 8-Feb-05 (Important)
  57. KB890175: MS05-001: Vulnerability in HTML Help could allow code execution Released 11-Jan-05 (Critical)
  58. <!--
    not security updates

  59. KB885932: Update for Internet Explorer 6 for XP Service Pack 2
  60. KB884020: Programs that connect to IP addresses that are in the loopback address range may not work as you expect in Windows XP Service Pack 2 Released Sep-04
  61. KB886185: Critical update for Windows Firewall "My Network (subnet) only" scoping in Windows XP Service Pack 2 Released 14-Dec-04 (Critical)
  62. -->

<!-- ******************************************************************** -->
The following security updates are not presently included:
<!-- ******************************************************************** -->

  1. KB923723: MS07-005: Vulnerability in Step-by-Step Interactive Training Could Allow Remote Code Execution Released 12-Feb-07 (Important)
  2. KB923789: MS06-069: Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution Released 14-Nov-06 (Critical)
  3. KB898458: MS05-031: Vulnerability in Step-by-Step Interactive Training Could Allow Remote Code Execution Released 14-Jun-05 (Important)
  4. KB893066: MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service Released 12-Apr-05 (Critical)
  5. KB890261: MS05-009: Vulnerability in PNG Processing Could Lead to Buffer Overrun Released 8-Feb-05 (Critical)
  6. KB887219: MS05-004: ASP.NET Path Validation Vulnerability Released 8-Feb-05 (Important)
  7. KB816093: MS03-011: Flaw in Microsoft VM Could Enable System Compromise Released 14-Dec-04 (Critical)

Please let me know if you feel I've missed an important update.

Fitting All the Hotfixes onto a 700MB CD

If you slipstream all of the hotfixes listed above, the resulting size will be greater than will fit on a single 700MB "80 minute" CD-R. There are two options to get around this limitation:

1. Burn to a DVD instead of a CD. Of course, this isn't an option if the computer you are installing on does not have a DVD drive, or you don't have software to burn an .ISO file to a DVD.

2. Remove unneeded directories from the CD. On my Windows XP SP1 CD, I found I could delete the following directories before creating the .ISO:

D:\I386\WIN9XMIG: 33.5MB (Windows 9x migration files, not used when performing a fresh XP installation)
D:\DOTNETFX:      33.1MB (.NET Framework, install this manually later if needed)
D:\cmpnents       26.5MB (.NET Framework, TabletPC)
D:\SUPPORT:       11.3MB (Support tools, not used by the installer)
D:\VALUEADD:       9.1MB (Value added programs, not used by the installer)
D:\I386\WIN9XUPG:  3.9MB (Windows 9x upgrade files, not used when performing a fresh XP installation)
D:\DOCS:           0.1MB (Miscellaneous documents, not used by the installer)

If you don't need to install the Recovery Console, you can remove:

D:\I386\WINNTUPG:  1.0MB (Windows NT/2000 upgrade files, not used when performing a fresh XP installation)

If you don't need to install languages other than English, you can remove:

D:\I386\LANG:    101.7MB

If you remove all of the above directories, you will have reduced the size of the CD by over 223MB. Using my Windows XP SP1 disk, I went from 786MB, to 563MB, which easily fits on most sizes of CD-R media (see the table below).

Here is a table listing the different sizes of CD media. The sizes listed below I discovered empirically, and may vary depending on the type of media used.

Disk Type                       Size
------------------------ -----------
80 minute/"700MB" CD-R   697,425,920
74 minute/"650MB" CD-R   642,883,584
80 minute/"700MB" CD-R/W 598,808,576
74 minute/"650MB" CD-R/W 557,260,800

Of course, using a program such as nLite, you can accomplish a far greater size reduction that what is listed above.

For more information, see:

http://unattended.msfn.org/unattended.xp/view/web/57/
http://pages.videotron.com/tbone/unattended/#_Toc79089721

Using Cygwin to Burn a Bootable CD

If you have, or install, Cygwin, you can build and burn a bootable CD, by editing the CD and CD_DEV variables at the beginning of xpsp2.mak, and typing:

$ make -f xpsp2.mak

You can also add the parameters on the command line:

$ make -f xpsp3.mak CD=F: CD_DEV=0,0,0

If you include md5s.txt (updated 03-May-09), make will verify the files downloaded correctly before executing them.

Note: KB885835 and KB885250 share the same file (mrxsmb.sys), so an error occurs if you attempt to slipstream both of them at once. These scripts solve this issue by superceeding KB885835's version of the file (5.1.2600.2541, xpsp_sp2_gdr.040919-1056, dated 10-27-2004, 448,128 bytes) with KB885250's version (5.1.2600.2598, xpsp_sp2_gdr.041130-1729, dated 1-18-2005, 451,584 bytes).

Of course, to run make, you will need to install Cygwin and select the make, perl, and wget packages.

To create a Windows XP boot disk with Service Pack 1a and Update Rollup 1 (KB826939), use xpsp1_ru.mak.

Older Scripts

To create a Windows XP boot disk with only SP1a, use xpsp1.mak.

To create a Windows 2000 boot disk with SP4, use w2k_sp4.mak.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Value missing in .SIF file?

Has anyone run into the following problem?

The xpsp2.cmd script runs just fine and I'm able to build a bootable DVD.

While doing a clean install, however, I end up with the following error message:

    The following value in the .SIF file used by setup is corrupted or missing:
    Value 0 on the line in section [SourceDisksFiles] with key "SP2.cab."

I checked the contents of TXTSETUP.SIF, and there is no SP2.CAB listed there.
So I guess the value is missing. But what would be the correct value to add?

There IS an entry for SP1.CAB; I'm guessing this is because the "base" CD contents that I started with are from an XP SP1 install CD. So... why didn't Microsoft's SP2 patcher put an update into the TXTSETUP.SIF?

--forbin

Final update before XP-SP2 End of Life?

With the stated "end of lifetime" for SP2 coming up very rapidly, I'd like to make sure that I'll be able to still reinstall a fully patched (or nearly so) XP-SP2 on my old machines. (I really prefer SP2 to SP3.)

Do you have any plans to update the SP2 automated script?
And is there anything I can do to help?

-- forbin

May 2009 build reporting all updates installed

I'm having an issue with the May 2009 build of xpsp3local.cmd. It downloads the patches, but then quickly scrolls to the end of the file and reports that all the available updates have been installed. However, the build from April 2009 installs updates without any problems. I know this isn't a lot of information, so please let me know what other information would be helpful.

\\ACB

Does this work for XP Home

Does this work for XP Home and Professional? online roulette poker calculator online blackjack video poker divx movies horse betting iphone games play slot machine online

zombo09,

I believe so, but I've never tried to slipstream XP Home. Please report back your experience if you try it.

Secondly, a question ... is

Secondly, a question ... is w2k_sp4.mak intended to download & slipstream Windows 2000 post-SP4 security hotfixes? If so, what is pointing to the list of hotfixes? I am not seeing it, especially when I compare this mak file to xpsp2.mak. I need to support slipstreamed hotfixes for both XP sp2 & 2000 sp4 and I'd like to put together a cmd script for 2000 similar to the one you have for XP; hence the need for understanding where to start looking for the 2000 post-SP4 hotfixes.

Thanks in advance and, again, great work.

RedSeo

I've upload w2ksp4.cmd. I doubt it's up to date, but it should provide a good start for you. Good luck.

Missing KB938464 file

April 8, 2009

The XP2 script hangs at this line:
:: MS08-052 - Critical
:: Vulnerabilities in GDI+ Could Allow Remote Code Execution (954593)
call :download http://download.microsoft.com/download/7/8/1/78141dc7-3b1d-42f3-9aa2-4dca79ad739b/WindowsXP-KB938464-x86-ENU.exe

For KB938464 M$ has a v2 file: WindowsXP-KB938464-v2-x86-ENU.exe

(I downloaded it and renamed it and the script found it fine.)

ccf108:

I've updated all the scripts with the new URL:

http://download.microsoft.com/download/7/8/1/78141DC7-3B1D-42F3-9AA2-4DCA79AD739B/WindowsXP-KB938464-v2-x86-ENU.exe

Thanks for the heads up!

-Ross

Good intel but SP2 is almost dead

Thank you for sharing this with us, but unfortunately I just found out that Microsoft is going to stop sales to XP in order to better promote Vista. I was pretty satisfied with XP and I really don't want to buy tons of RAM just to run Office. Until then let's enjoy XP while we can.

Free Windows Software

What of SP3

Now that Windows reliesed Service Pack 3, which integrates all previous fixes and service packs the above fixes are no longer needed, isn't this so? All we need, as of today, May 29,2008 is the SP3. When is the software going to be updates so it does this?
Thank you

M

"It is only with the heart that one can see rightly what is essential is invisible to the eye."
The Little Prince - Antoine St.Exupery

pintree3,

If someone wants to slipstream SP3, then my SP2-based script will need to be modified to only apply post-SP3 hotfixes.

xpsp2.cmd not working correctly

Hello,
I'm pulling my hair out on this one. When I run the xpsp2.cmd file it only copies over the xp files to my directory on the root C: If my xp disk is in the D drive the text in the initial prompt is different than if the cd isn't in the drive.

this is what it looks like when the cd is in the drive and I run the cmd file:

Enter the full directory name to copy the Windows XP Installation files to
or press [Enter] for 'C:\Documents and Settings\xxxx\Desktop\WXPVOL_EN' or en
ter Q to quit:

If there's no cd in the drive, this is what the prompt says when I run the cmd file:

This script will copy files from a Windows XP installation CD to a directory
you choose, and download and slipstream Service Pack 2 and all Post-SP2
security hotfixes into it.

Enter the directory containing the Windows XP installation CD files
or press [Enter] for 'D:' or enter Q to quit :

So i ran the cmd file a second time with and without the cd in the dvd drive. I pointed the download to the folder in my root directory where I saved the xp installation files: xpsp2. Each time the cmd file started using wget to download the files -- but all to my desktop.

Here's what it looks like:

The current time is: 11:18:36.38
Waiting for "C:\Documents and Settings\xxxx\Desktop\WindowsXP-KB888302-x86-EN
U.exe" to appear
or press [Ctrl]-[Break] to abort...
processed file: C:\Documents and Settings\xxxx\Desktop\WindowsXP-KB888302-x86
-ENU.exe
The filename, directory name, or volume label syntax is incorrect.
--2008-04-29 11:18:37-- http://download.microsoft.com/download/c/7/a/c7a958a9-5
4cf-4336-8123-d7fb74d5cd06/WindowsXP-KB887472-x86-enu.exe
Resolving download.microsoft.com... 70.183.191.14, 70.183.191.15
Connecting to download.microsoft.com|70.183.191.14|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1080552 (1.0M) [application/octet-stream]
Saving to: `WindowsXP-KB887472-x86-enu.exe'

80% [==============================> ] 870,807 1.91M/s ^

I changed the default directories of my browsers (firefox, ie, safari) to point to the destination directory in the root. Nothing! I tried moving the cmd script to the root. All the hotfixes and updates continue to download to my desktop. BTW...the script gets the files from the xp cd to the file okay. But then it terminates and nothing happens. So I run it again. that's when it starts downloading the hotfixes and updates to my desktop. Am I missing something?

Please advise.

Thank you.

tovah1,

You are running under and administrator's account, yes?

First, the CD needs to be in the CD drive.

From what you have included, I can't determine what exactly is your problem, but I would try creating a directory in the root of C:, called say, xpsp2. Next, copy xpsp2.cmd into this directory. Then change to this directory, and execute xpsp2.cmd. Here's an example:

C:
MKDIR xpsp2
CD xpsp2
COPY "C:\Documents and Settings\xxxx\Desktop\xpsp2.cmd" .
xpsp2.cmd

and follow the prompts.

Ross, Thank you! Everything

Ross,

Thank you! Everything worked and I discovered along that way that one of the computers I was using is missing the "windows" directory. That's going to be fun to fix, eh? Then I found that my original copy of my xp disk was corrupted somehow, so I used my backup. I did just as you suggested and moved to a known-good computer and your file worked perfectly -- all the xp files copied over and 90 update files downloaded to the correct directory and integrated.

Thanks again for your quick reply! 8-)P

editing the xpsp2.mak file

How exactly is the CD and CD_DEV section supposed to look after the recommended edit? I have little experience and am confused.

Thank you.

tovah1

You can change xpsp2.mak to have this:

CD=D:
CD_DEV=1,0,0

or you can create a separate file, called local.mak, in the same directory. If xpsp2.mak finds local.mak, it's settings will override whatever settings are in xpsp2.mak.

Okay, I'm new. So i made the

Okay, I'm new. So i made the change to the xpsp2.mak file to read:

cd=C:\xpvol_en (this is where i copied all of the files from my xp disk)
cd_dev=0,0,0 (this is where i used the cdrecord -scanbus to find where my burner is located.

when i run the .mak file here's what i get:

(a bunch of other preprocessing files omitted cuz they're so many)

Preprocessing 948881...
Preprocessing finished
Copying c:wxpvol_en to xpsp2_cd...
mkdir -p xpsp2_cd
xcopy c:\wxpvol_en\\ xpsp2_cd\\ /e /r /y
Invalid path
0 File(s) copied
make: *** [xpsp2.touch] Error 4

what am i doing wrong. i used cd desktop in cygwin to run the .mak file. when i put that file in the c: directory cygwin couldn't find it. What am I doing wrong.

Thank you for your help.

I re-read the code for the

I re-read the code for the .mak and realized that it was okay to put the xp cd into the dvd drive because this was a sequential process and I would be asked to provide a dvd to burn after the files had been integrated. So I put the xp cd into the player and everything ran smoothly until I got to the last update. Here's the message I received:

Last-modified header missing -- time-stamps turned off.
11:44:29 (4.15 MB/s) - `bbie10.zip' saved [1353/1353]

unzip -o bbie10.zip bbie.exe
Archive: bbie10.zip
End-of-central-directory signature not found. Either this file is not
a zipfile, or it constitutes one disk of a multi-part archive. In the
latter case the central directory and zipfile comment will be found on
the last disk(s) of this archive.
unzip: cannot find zipfile directory in one of bbie10.zip or
bbie10.zip.zip, and cannot find bbie10.zip.ZIP, period.
make: *** [bbie.exe] Error 9

And that was it. Any ideas?

Thank you.

A little head scratching and

A little head scratching and I figured out the issue: my firewall decided that it didn't like the first nu2 mirror site. So I adjusted the .mak code temporarily until I could figure out the issue with the firewall, and everything worked perfectly. Thank you for writing such an amazing script! I have to agree with everyone here and say that this was the most painless xp build I've ever had. Outstanding job, Ross!

Thank you, Ross. I'll give

Thank you, Ross. I'll give that a try later and let you know how it turns out!

Update from SP2?

I used an already slipstreamed version of SP2 to simply get all the updates installed.
The script seemed to have worked fine, I did not get any errors...
Then I burned my CD and installed the OS on a new machine... but none of the updated were installed?

How can I verify before I burn a cd that the updates were infact integrated correctly?

plabonte,

script

Firstly, thank you for creating a superb script.

I use this script as part of an automated update batch file that I run. However, I have come across a small problem that I would like to share and propose a possible change to the script.

Because I call xpsp2.cmd from another batch file (stored elsewhere) I have noticed that wget program downloads the patches to this location rather than the specified hotfixdir variable. As a result I have had to alter the script to work for me. I have included the wget function that I have had to change below. This script is located just about the ":start_downloads" section label on line 202. I added the "-P%hotfixdir%" option to the wget command. This forces the wget function to download to this directory.

wget --version >nul 2>nul
if not errorlevel 9009 (
set DOWNLOADER=wget -nd -N -P%hotfixdir%
goto start_downloads
)

Thanks,

Tony.

Sweet Script

I threw mine away and updated yours to use ARIA2C.

Sweet! Much faster now... :-D

JerichoJones

Do you mean, the aria2c that I ported to Windows??? :)

Of course!

Of course!

Other Language

I would like to do a slipstream of the Dutch version of XP Home. Can I also use your script for the Dutch version or does it only work for the English one?

XP Home and Pro

Does this work for XP Home and Professional?

Language

I would like to do a slipstream of the Dutch version of XP Home. Can I also use your script for the Dutch version or does it only work for the English one?

grant33,

yes, it works with both Home and Pro.

Help Making Iso

Hello All any one can tell me how to get the XPSP2.mak file to make the ISO after it has merged the Hotfix files.
I can do it make the ISO with UltraIso manually, but cant get the XPSP2.mak file to do it for me, would be nice it if I knew where I was going wrong with it.

Zarts

Zarts,

xpsp2.mak requires Cygwin, and cdrecord to be installed. These are both command line tools, and not Windows GUI based applications, like UltraISO.

A problem

I used your batch file to try and create an updated Windows XP install CD from a very old copy (circa 2002-2003 or pre-SP1). I created the boot disk fine and the setup program starts exactly as I expect, however after the setup program begins loading files I receive a message:

The file ohci1394.sys could not be found
Press any key to continue

Pressing any key will exit the setup program.

I was wondering if anyone else had this issue and what I could do to resolve it.

I've never tried using a pre-SP1 disk

Can you find an SP1, or SP2 disk, and see if the problem goes away?

I suppose

I'd have to download a copy, but one thing I don't know: is the product key specific to the Disk the product came on or is its legitimacy determined by some calculations performed on it? I'm pretty sure its the second case so I'll go ahead and try to download a copy (I actually own a legitimate copy unlike a lot of people I know). Its Windows XP Professional by the way, but I doubt that makes a difference. Interestingly enough the file is there, located in a .cab file, I tried extracting it and putting it with all the other .sys files but to no avail.

PS: Thank you for helping me with this it takes me 1.5+ hours to update my archaic copy of Windows XP.

EDIT: Yes it seems to work with a SP2 Image I downloaded, couldn't find an SP1 Image but for pre-SP1 I believe there are more updates required. It also seems that if you use an SP2 Image the resulting set of files is small enough to fit on a single 700MB CD. I haven't tried installing the updated version yet but it did boot up and get through the set-up process.

ORDER OF SLIPSTREAM

HELLO,

ANYBODY KNOWS, IN WHICH ORDER TO SLIPSTREAM THE HOTFIXES????

...DOESNT MATTER??

...BY THE kb NUMBERS (FROM SMALLETS TO HIGHEST)??

....IN THE ORDER I SEE MICROSOFT UPDATE (ONLINE) TO DO IT..???

PETR

Some of the best i have seen

Hi Ross

I´m a RIS system administrator and I must say, this is some of the best scripting in batch to get downloads and integrate them into
ones RIS installations, you´ve save me a ton of time.

I´m testing the whole package now and what it seems like, it´s right on the money :-)

My goal was to get a Windows XP SP2 up-to-date with all MS Windows Updates in one stroke (useing Wsus at the mom., but it stil takes too
long), so there is two reasons for me to write a msg. to you.

1. Could you include all Windows update for the WinXpSP2?.. i´m thinking of Windows media Player 11, Framework etc., it does not matter if if goes over 700mb
ill put it into RIS anyway.

2. To give you outstanidng credit for your work and keep it up.. ill sure be back here to see after new updates of your script :-)

Regards Peter

Peter,

My goal is only to slipstream security hotfixes. There are many other programs I could slipstream, but then my script would not appeal to the broadest possible audience.

If you decide to add non-security related applications, send me a copy of the modified script, and I'll be happy to post it here.

Hotfix Integration

Ross,

Thanks for the great script. Of all the slipstream/hotfix procedures I've found, your's is the easiest to use and most up to date.

I followed icura's step-by-step and everything appears to have worked. In addition to the xpsp2 folder on my desktop I also have 80 applications/executables with different labels, this being one example "WindowsXP-KB885835-x86-ENU.exe". They appear to correspond to your list of security updates.

Since I haven't seen this issue mentioned before I'm unsure if everything worked correctly. There were no error messages and the script ran through to completion.

Is there any way to verify that the hotfixes were integrated correctly?

thanks
Brian

Brian,

First off, xpsp2.cmd will abort with an error message if the hotfix returned an error during integration.

But if you really want to see if all is well, you could look at the file I386\svcpack\HFINT.DAT (on my system it's in D:\X1APCCP_EN\X1APCCP_EN\I386\svcpack\HFINT.DAT). This contains a list of all the hotfixes that have been slipstreamed.

I hope that answers your question.

Hotfix Integration

Ross,

After reading your reply I looked and couldn't find the svcpack folder nor the HFINT.DAT file. I figured I had nothing to lose so I went through the process again.

I watched the whole time as it went through the CD copy, hotfix download, and hotfix integration steps. When I looked this time I found the svcpack folder and the HFINT.DAT file which listed all the hotfixes.

I'm not sure what I did wrong on the first go around, I'm glad I got it right on the second.

Thanks for your help and your great process.
Brian

SP2 integration problem

Ross,

First off thanks for the work you've put into this. It makes the work of getting a new XP install up and running so, so much easier.

Problem is, I've never been able to get the xpsp2.cmd to work the way it's supposed to. After all updates have been downloaded, I always get the error message that 'SP2 is not a valid Win32 application' and then it either moves on to integrating all the other updates or just stops the integration altogether. This happens regardless of whether I download SP2 as part of the overall process or whether I have it ahead of time in the directory with the other updates.

As a workaround, I commented out the entire downloading process (because I already had all updates downloaded from a previous attempt), slipstreamed SP2 into my baseline XP install separately, then used this updated SP2 directory as the basis from which to start the integrating of all the other updates, using your script.

So, any idea what might be wrong? Also, although my kludged commenting-out apparently worked, can you describe exactly which lines should be changed in order to not download any of the updates (under the assumption that they're already downloaded) and not integrate SP2, just all the other updates? Thanks.

problems with IE after using the 12-29-07 xpsp2.cmd

After creating a new ISO uning the 12-29-07 xpsp2.cmd - I have problems with IE
the most obvious one is: Right click the desktop - select properties -click the desktop tab and then click customize desktop.
The option to place IE on the desktop is no longer there! I am also having communications problems with some IE based applications.
After discovering the problem - I tried upgrading to IE 7 to resolve the issue. The upgrade was successful but the problems persist.
Any suggestions on what the problem might be?
Thanks

bpeck,

Sorry, I don't use IE. I use firefox. Are you required to use IE?

You could try installing XP with only SP2 slipstreamed, then run xpsp2local.cmd to install the hotfixes one at a time until you find the hotfix that is causing the issues you are describing.

I know, that's a long and painful process, and you may not even find the problem after all that work.

Good luck,

Ross

I don't use cygwin, after

I don't use cygwin, after download the latest full slipstream_xpsp2 package, I use easyboot, Once finished, there can save the result as a bootable ISO file and use your CD burner to create the CD. It work fine for me.

Thanks very much, great work.

Easyboot is good

I also use Easyboot and I am pretty satisfied with it. It's a good tool.

Trial software

your link doesn't work, here

your link doesn't work, here is the mirror for easyboot

janetkellman,

Here's the publisher's website: http://www.ezbsystems.com/easyboot.

Add warning for when builddir isn't an absolute path?

I'm trying to rescue a dying PC and just spent the better part of two hours tring to figure out why xpsp2.cmd and BartPE wouldn't play together. Turns out it was user error (natch)... I didn't RTFM and was setting builddir= to a relative path. Doing so, of course, breaks the patch integration and turns xpsp2.cmd into a slow, noisy way to copy one folder to another.

The real problem, from my perspective, is that there wasn't any (obvious) way to tell that it had failed. There are no errors displayed during the process, so the only ways to tell that it didn't work were to 1) watch the whole process and notice that the SP2 integration GUI doesn't come up, 2) watch the whole process and notice that the hotfixes are applying *slightly* faster than normal, or 3) examine the builddir afterward and notice the lack of, e.g., win51ip.SP2. As I didn't know what to look for and the patches *seemed* to be applying (so it didn't occur to me to squint at the results), I had no idea the integrations were failing.

I've gone back and fixed my blunder (and BartPE is now quite happy with the result), but I thought I'd drop by for a feature request: some kind of feedback on failure. Specifically, it would be nice if the script had a way to verify that builddir= is an absolute path (say, by checking that the second character is a colon or that the first two characters are backslashes; I've no idea how to do this in a .cmd file, but your command-line-fu is obviously much stronger than mine) and to verify that SP2 had successfully installed before continuing (say, by checking for win51ip.SP2 or another "flag file").

--
Unless, of course, rock *doesn't* beat paper...

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
DeutschEspañolFrançaisItalianoNederlandsPortuguêsΕλληνικάРусскийالعربية中文(简体)中文(繁體)日本語한국어
 
Donate Bitcoins
Google
 
www smithii.com
 
Special thanks to Riester Rente Online for a generous donation!