Automatically Slipstream Windows XP with SP2 and All Post-SP2 Security Hotfixes with a Single Command (Updated 03-May-09)
For information about slipstreaming Windows XP SP3, visit http://smithii.com/slipstream_xpsp3.
I've written the batch file xpsp2.cmd (updated 03-May-09) to automatically download and slipstream a standard Windows XP boot disk with Service Pack 2 and all post-SP2 security hotfixes. It uses wget or curl (if either are found in the PATH), or your installed browser to download the updates. I have tested this with Internet Explorer, Firefox, and Opera. Other browsers should work, as well. The batch file xpsp2local.cmd (updated 03-May-09) will update the copy of Windows XP that is installed on the computer you run the command on. You may wish to do this, if you do not have, or want, the machine you want to hotfix connected to the internet, or if you are unable to run Windows Update for some reason (for example, if Internet Explorer isn't installed, or doesn't work properly, due to a virus or similar mishap). To slipstream the hotfixes, and burn the slipstreamed disk, I've created the makefile xpsp2.mak (updated 03-May-09). Details on usage below.Microsoft XML Core Services Hotfixes
For Microsoft XML Core Services, run msxml_hotfixes.cmd (updated 24-Aug-07) to install the latest hotfixes locally.
Microsoft Office 2003 SP2 and Hotfixes
For Office 2003, run office_2003_hotfixes.cmd (updated 25-Aug-07) to install Service Pack 2, and all post-SP2 hotfixes locally.
The xpsp2* scripts listed above include the following security updates found at http://www.microsoft.com/technet/security/current.aspx:Apr 09: MS09-010 - Critical Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code Execution (960477) KB923561 SP2: replaces none SP3: replaces none MS09-013 - Critical Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution (960803) SP2: replaces none SP3: replaces none MS09-011 - Critical Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (961373) SP2: replaces MS08-033 SP3: replaces MS08-033 MS09-014 - Critical Cumulative Security Update for Internet Explorer (963027) SP2: replaces MS08-073, MS08-078 SP3: replaces MS08-073, MS08-078 MS09-012 - Important Vulnerabilities in Windows Could Allow Elevation of Privilege (959454) SP2: replaces MS07-022, MS08-002, MS08-064 SP3: replaces MS08-064 MS09-015 – Moderate Blended Threat Vulnerability in SearchPath Could Allow Elevation of Privilege (959426) SP2: replaces MS07-035 SP2: replaces MS07-035 Mar 09: MS09-006 – Critical Vulnerabilities in Windows Kernel Could Allow Remote Code Execution (958690) SP2: replaces MS08-061 SP3: replaces MS08-061 MS09-007 - Important Vulnerability in SChannel Could Allow Spoofing (960225) SP2: replaces MS07-031 SP3: replaces none Feb 09: Jan 09: MS09-001 – Critical Vulnerabilities in SMB Could Allow Remote Code Execution (958687) SP2: replaces MS08-063 SP3: replaces MS08-063 Dec 08: MS08-071 – Critical Vulnerabilities in GDI Could Allow Remote Code Execution (956802) SP2: replaces MS08-021 SP3: replaces none MS08-073 - Critical Cumulative Security Update for Internet Explorer (958215) SP2: replaces MS08-058 SP3: replaces MS08-058 MS08-076 – Important Vulnerabilities in Windows Media Components Could Allow Remote Code Execution (959807) SP2: replaces none SP3: replaces none MS08-078 - Critical Security Update for Internet Explorer (960714) SP2: replaces none SP3: replaces none Nov 08: MS08-068 | Important Vulnerability in SMB Could Allow Remote Code Execution (957097) SP2: replaces MS05-011 SP3: replaces none MS08-069 | Critical Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (955218) SP2: replaces MS06-042 SP3: replaces none Oct 08: MS08-058 - Critical Cumulative Security Update for Internet Explorer (956390) SP2: replaces MS08-045 SP3: replaces MS08-045 MS08-061 – Important Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (954211) SP2: replaces MS08-025 SP3: replaces none MS08-062 - Important Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution (953155) SP2: replaces none SP3: replaces none MS08-063 – Important Vulnerability in SMB Could Allow Remote Code Execution (957095) SP2: replaces MS06-063 SP3: replaces none MS08-064 – Important Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege (956841) SP2: replaces MS07-022 SP3: replaces none MS08-066 – Important Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege (956803) SP2: replaces none SP3: replaces none MS08-067 – Critical Vulnerability in Server Service Could Allow Remote Code Execution (958644) SP2: replaces MS06-040 SP3: replaces none Sep 08: MS08-052 - Critical Vulnerabilities in GDI+ Could Allow Remote Code Execution (954593) SP2: replaces none SP3: replaces none MS08-053 - Critical Vulnerability in Windows Media Encoder 9 Could Allow Remote Code Execution (954156) SP2: replaces none SP3: replaces none MS08-054 - Critical Vulnerability in Windows Media Player Could Allow Remote Code Execution (954154) SP2: replaces none SP3: replaces none Aug 08: MS08-045 - Critical Cumulative Security Update for Internet Explorer (953838) SP2: replaces MS08-031 SP3: replaces MS08-031 MS08-046 - Critical Vulnerability in Microsoft Windows Image Color Management System Could Allow Remote Code Execution (952954) SP2: replaces none SP3: replaces none MS08-048 - Important Security Update for Outlook Express and Windows Mail (951066) SP2: replaces none SP3: replaces none MS08-049 - Important Vulnerabilities in Event System Could Allow Remote Code Execution (950974) SP2: replaces none SP3: replaces none MS08-050 - Important Vulnerability in Windows Messenger Could Allow Information Disclosure (955702) SP2: replaces none SP3: replaces none Jul 08: MS08-037 - Important Vulnerabilities in DNS Could Allow Spoofing (953230) SP2: replaces MS06-064, MS08-001 SP3: replaces none Jun 08: MS08-030 - Critical Vulnerability in Bluetooth Stack Could Allow Remote Code Execution (951376) SP2: replaces none SP3: replaces none MS08-031 - Critical Cumulative Security Update for Internet Explorer (950759) SP2: replaces MS08-024 SP3: replaces none replaced by MS08-45 MS08-032 - Moderate Cumulative Security Update of ActiveX Kill Bits (950760) SP2: replaces MS08-023 SP3: replaces none MS08-033 - Critical Vulnerabilities in DirectX Could Allow Remote Code Execution (951698) SP2: replaces MS07-064 SP3: replaces none MS08-035 - Important Vulnerability in Active Directory Could Allow Denial of Service (953235) SP2: replaces MS08-003 SP3: replaces none MS08-036 - Important Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service (950762) SP2: replaces MS06-052 SP3: replaces none
- KB941693: MS08-025: Vulnerability in Windows Kernel Could Allow Elevation of Privilege Release 08-Apr-08 (Important)
- KB944338: MS08-022: Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution Release 08-Apr-08 (Critical)
- KB948590: MS08-021: Vulnerabilities in GDI Could Allow Remote Code Execution Release 08-Apr-08 (Critical)
- KB945553: MS08-020: Vulnerability in DNS Client Could Allow Spoofing Release 08-Apr-08 (Important)
- KB947890: MS08-008: Vulnerability in OLE Automation Could Allow Remote Code Execution Released 12-Feb-08 (Critical)
- KB946026: MS08-007: Vulnerability in WebDAV Mini-Redirector Could Allow Remote Code Execution Released 12-Feb-08 (Critical)
- KB942830: MS08-006: Vulnerability in Internet Information Services Could Allow Remote Code Execution Released 12-Feb-08 (Important)
- KB942831: MS08-005: Vulnerability in Internet Information Services Could Allow Elevation of Privilege Released 12-Feb-08 (Important)
- KB943485: MS08-002: Vulnerability in LSASS Could Allow Local Elevation of Privilege Released 08-Jan-08 (Important)
- KB941569: MS07-068: Vulnerability in Windows Media File Format Could Allow Remote Code Execution Released 11-Dec-07 (Critical)
- KB944653: MS07-067: Vulnerability in Macrovision Driver Could Allow Local Elevation of Privilege Released 11-Dec-07 (Important)
- KB937894: MS07-065: Vulnerability in Message Queuing Could Allow Remote Code Execution Released 11-Dec-07 (Important)
- KB943460: MS07-061: Vulnerability in Windows URI Handling Could Allow Remote Code Execution Released 13-Nov-07 (Critical)
- KB933729: MS07-058: Vulnerability in RPC Could Allow Denial of Service Released 09-Oct-07 (Important)
- KB941202: MS07-056: Security Update for Outlook Express and Windows Mail Released 09-Oct-07 (Critical)
- KB923810: MS07-055: Vulnerability in Kodak Image Viewer Could Allow Remote Code Execution Released 09-Oct-07 (Critical)
- KB938127: MS07-050: Vulnerability in Vector Markup Language Could Allow Remote Code Execution Released 14-Aug-07 (Important)
- KB936782: MS07-047: Vulnerability in Windows Media Player Could Allow Remote Code Execution Released 14-Aug-07 (Critical)
- KB939373: MS07-041: Vulnerability in Microsoft Internet Information Services Could Allow Remote Code Execution Released 20-Jul-07 (Important)
- KB935839: MS07-035: Vulnerability in Win32 API Could Allow Remote Code Execution Released 12-Jun-07 (Critical)
- KB929123: MS07-034: Cumulative Security Update for Outlook Express and Windows Mail Released 12-Jun-07 (Critical)
- KB935840: MS07-031: Vulnerability in the Windows Schannel Security Package Could Allow Remote Code Execution Released 12-Jun-07 (Critical)
- KB931784: MS07-022: Vulnerability in Windows Kernel Could Allow Elevation of Privilege Released 07-Apr-07 (Important)
- KB930178: MS07-021: Vulnerabilities in CSRSS Could Allow Remote Code Execution Released 07-Apr-07 (Critcal)
- KB932168: MS07-020: Vulnerability in Microsoft Agent Could Allow Remote Code Execution Released 07-Apr-07 (Critcal)
- KB931261: MS07-019: Vulnerability in Universal Plug and Play Could Allow Remote Code Execution Released 07-Apr-07 (Critcal)
- KB925902: MS07-017: Security Update for Windows XP Released 03-Apr-07 (Critcal)
- KB918118: MS07-013: Vulnerability in Microsoft RichEdit Could Allow Remote Code Execution Released 12-Feb-07 (Important)
- KB924667: MS07-012: Vulnerability in Microsoft MFC Could Allow Remote Code Execution Released 12-Feb-07 (Important)
- KB926436: MS07-011: Vulnerability in Microsoft OLE Dialog Could Allow Remote Code Execution (Important) Released 12-Feb-07 (Important)
- KB927779: MS07-009: Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution Released 12-Feb-07 (Critical)
- KB928843: MS07-008: Vulnerability in HTML Help ActiveX Control Could Allow Remote Code Execution Released 12-Feb-07 (Critical)
- KB927802: MS07-007: Vulnerability in Windows Image Acquisition Service Could Allow Elevation of Privilege Released 12-Feb-07 (Important)
- KB928255: MS07-006: Vulnerability in Windows Shell Could Allow Elevation of Privilege Released 12-Feb-07 (Important)
- KB926255: MS06-075: Vulnerability in Windows Could Allow Elevation of Privilege Released 12-Dec-06 (Important)
- KB926247: MS06-074: Vulnerability in SNMP Could Allow Remote Code Execution Released 12-Dec-06 (Important)
- KB924270: MS06-070: Vulnerability in Workstation Service Could Allow Remote Code Execution Released 14-Nov-06 (Critical)
- KB920213: MS06-068: Vulnerability in Microsoft Agent Could Allow Remote Code Execution Released 14-Nov-06 (Critical)
- KB923980: MS06-066: Vulnerabilities in Client Service for NetWare Could Allow Remote Code Execution Released 14-Nov-06 (Important)
- KB924496: MS06-065: Vulnerability in Windows Object Packager Could Allow Remote Execution Released 10-Oct-06 (Moderate)
- KB923414: MS06-063: Vulnerability in Server Service Could Allow Denial of Service and Remote Code Execution Released 10-Oct-06 (Important)
- KB924191: MS06-061: Vulnerabilities in Microsoft XML Core Services could allow remote code execution Released 10-Oct-06 (Critical)
- KB923191: MS06-057: Vulnerability in Windows Explorer Could Allow Remote Execution Released 10-Oct-06 (Critical)
- KB920685: MS06-053: Vulnerability in Indexing Service Could Allow Cross-Site Scripting Released 12-Sep-06 (Moderate)
- KB920670: MS06-050: Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution Released 08-Aug-06 Important)
- KB920683: MS06-041: Vulnerability in DNS Resolution Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
- KB914388: MS06-036: Vulnerability in DHCP Client Service Could Allow Remote Code Execution Released 11-Jul-06 (Critical)
- KB914389: MS06-030: Vulnerability in Server Message Block Could Allow Elevation of Privilege Released 13-Jun-06 (Important)
- KB911280: MS06-025: Vulnerability in Routing and Remote Access Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
- KB918439: MS06-022: Vulnerability in ART Image Rendering Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
- KB913580: MS06-018: Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of service Released 09-May-06 (Moderate)
- KB908531: MS06-015: Vulnerability in Windows Explorer Could Allow Remote Code Execution Released 11-Apr-06 (Updated 25-Apr-06) (Critical)
- KB911562: MS06-014: Vulnerability in Microsoft Data Access Components (MDAC) function could allow code execution Released 11-Apr-06 (Updated 11-May-06) (Critical)
- KB901190: MS06-009: Vulnerability in the Korean Input Method Editor (IME) could allow elevation of privilege Released 10-May-06 (Important)
- KB911927: MS06-008: Vulnerability in Web Client Service Could Allow Remote Code Execution Released 10-May-06 (Important)
- KB911564: MS06-006: Vulnerability in Windows Media Player Plug-in with Non-Microsoft Internet Browsers Could Allow Remote Code Execution Released 10-May-06 (Important)
- KB911565: MS06-005: Vulnerability in Windows Media Player 9 Could Allow Remote Code Execution Released 10-May-06 (Critical)
- KB908519: MS06-002: Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution Released 11-Jan-06 (Critical)
- KB902400: MS05-051: Vulnerabilities in MS DTC and COM+ could allow remote code execution Released 8-Nov-05 (Critical)
- KB900725: MS05-049: Vulnerabilities in the Windows shell could allow for remote code execution Released 29-Dec-05 (Important)
- KB901017: MS05-048: Vulnerability in the Microsoft Collaboration Data Objects Could Allow Remote Code Execution Released 29-Dec-05 (Important)
- KB905749: MS05-047: Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege Released 29-Dec-05 (Important)
- KB905414: MS05-045: Vulnerability in Network Connection Manager Could Allow Denial of Service Released 29-Dec-05 (Moderate)
- KB896423: MS05-043: Vulnerability in Print Spooler Service Could Allow Remote Code Execution Released 14-Aug-05 (Critical)
- KB899587: MS05-042: Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing Released 14-Aug-05 (Moderate)
- KB899591: MS05-041: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service Released 14-Aug-05 (Moderate)
- KB893756: MS05-040: Vulnerability in Telephony Service Could Allow Remote Code Execution Released 14-Aug-05 (Important)
- KB901214: MS05-036: Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution Released 12-Jul-05 (Critical)
- KB896428: MS05-033: Vulnerability in Telnet Client Could Allow Information Disclosure Released 14-Jun-05 (Moderate)
- KB890046: MS05-032: Vulnerability in Microsoft Agent Could Allow Spoofing Released 14-Jun-05 (Moderate)
- KB896358: MS05-026: Vulnerability in HTML Help Could Allow Remote Code Execution Released 14-Jun-05 (Critical)
- KB890859: MS05-018: Vulnerabilities in Windows kernel Could Allow Elevation of Privilege and Denial of Service Released 12-Apr-05 (Important)
- KB891781: MS05-013: Vulnerability in the DHTML Editing Component ActiveX Control Could Allow Code Execution Released 8-Feb-05 (Critical)
- KB887472: MS05-009: Vulnerability in PNG Processing Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
- KB888302: MS05-007: Vulnerability in Windows Could Allow Information Disclosure Released 8-Feb-05 (Important)
- KB885835: MS04-044: Vulnerabilities in Windows Kernel and LSASS Could Allow Elevation of Privilege Released 14-Dec-04 (Important)
- KB873339: MS04-043: Vulnerability in HyperTerminal Could Allow Code Execution Released 14-Dec-04 (Important)
- KB885836: MS04-041: A Vulnerability in WordPad Could Allow Code Execution Released 14-Dec-04 (Important)
- KB835935: Windows XP Service Pack 2 Released 24-Aug-04
<!-- Feb, 2008: http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx -->
<!-- Jan, 2008: http://www.microsoft.com/technet/security/bulletin/ms08-jan.mspx -->
<!-- Dec, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-dec.mspx -->
<!-- Nov, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-nov.mspx -->
<!-- Oct, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-oct.mspx -->
<!-- Aug, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-aug.mspx -->
<!-- Jul, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-jul.mspx -->
<!-- June, 2007: http://www.microsoft.com/technet/security/bulletin/ms10-jun.mspx -->
<!-- May, 2007: http://www.microsoft.com/technet/security/bulletin/ms10-may.mspx -->
<!-- April, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-apr.mspx -->
<!-- February, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-feb.mspx -->
<!-- December, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-dec.mspx -->
<!-- November, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-nov.mspx -->
<!-- October, 2006: http://www.microsoft.com/technet/security/bulletin/ms08-oct.mspx -->
<!-- September, 2006: http://www.microsoft.com/technet/security/bulletin/ms07-sep.mspx -->
<!-- August, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-aug.mspx -->
<!-- July, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-jul.mspx -->
<!-- June, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-jun.mspx -->
<!-- May, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-may.mspx -->
<!-- April, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-apr.mspx -->
<!-- February, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-feb.mspx -->
<!-- January, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-jan.mspx -->
<!-- November, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-nov.mspx -->
<!-- October, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-oct.mspx -->
<!-- August, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-aug.mspx -->
<!-- July, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-jul.mspx -->
<!-- June, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-jun.mspx -->
<!-- April, 2005 -->
<!-- February, 2005 -->
<!-- December, 2004 -->
<!-- August, 2004 -->
<!-- ******************************************************************** -->
These updates are not included as they have been superceeded by a following update:
<!-- ******************************************************************** -->
- KB947864: MS08-024: Cumulative Security Update for Internet Explorer Release 08-Apr-08 (Critical)
- KB948881: MS08-023: Security Update of ActiveX Kill Bits Release 08-Apr-08 (Critical)
- KB944533: MS08-010: Cumulative Security Update for Internet Explorer Released 12-Feb-08 (Critical)
- KB946538: MS08-003: Vulnerability in Active Directory Could Allow Denial of Service Released 12-Feb-08 (Important)
- KB941644: MS08-001: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution Released 08-Jan-08 (Critical)
- KB938829: MS07-046: Vulnerability in GDI Could Allow Remote Code Execution Released 14-Aug-07 (Critical)
- KB942615: MS07-069: Cumulative Security Update for Internet Explorer Released 11-Dec-07 (Critical)
- KB941568: MS07-064: Vulnerabilities in DirectX Could Allow Remote Code Execution Released 11-Dec-07 (Critical)
- KB939653: MS07-057: Cumulative Security Update for Internet Explorer Released 09-Oct-07 (Critical)
- KB937143: MS07-045: Cumulative Security Update for Internet Explorer Released 14-Aug-07 (Critical)
- KB921503: MS07-043: Vulnerability in OLE Automation Could Allow Remote Code Execution Released 14-Aug-07 (Critical)
- KB933566: MS07-033: Cumulative Security Update for Internet Explorer Released 12-Jun-07 (Critical)
- KB931784: MS07-027: Cumulative Security Update for Internet Explorer Released 08-May-07 (Critical)
- KB928090: MS07-016: Cumulative Security Update for Internet Explorer Released 12-Feb-07 (Critical)
- KB929969: MS07-004: Vulnerability in Vector Markup Language Could Allow Remote Code Execution Released 09-Jan-07 (Critical)
- KB923689: MS06-078: Vulnerability in Windows Media Format Could Allow Remote Code Execution Released 12-Dec-06 (Critical)
- KB923694: MS06-076: Cumulative Security Update for Outlook Express Released 12-Dec-06 (Important)
- KB925454: MS06-072: Cumulative Security Update for Internet Explorer Released 12-Dec-06 (Critical)
- KB922760: MS06-067: Cumulative Security Update for Internet Explorer Released 14-Nov-06 (Critical)
- KB925486: MS06-055: Vulnerability in Vector Markup Language Could Allow Remote Code Execution Released 12-Sep-06 (Critical)
- KB922819: MS06-064: Vulnerabilities in TCP/IP IPv6 Could Allow Denial of Service Released 10-Oct-06 (Low)
- KB919007: MS06-052: Vulnerability in Reliable Multicast Program (PGM) Could Allow Remote Code Execution Released 12-Sep-06 (Important)
- KB917422: MS06-051: Vulnerability in Windows Kernel Could Result in Remote Code Execution Released 08-Aug-06 (Critical)
- KB922616: MS06-046: Vulnerability in HTML Help Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
- KB921398: MS06-045: Vulnerability in Windows Explorer Could Allow Remote Code Execution Released 08-Aug-06 Important)
- KB920214: MS06-043: Vulnerability in Microsoft Windows Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
- KB918899: MS06-042: Cumulative Security Update for Internet Explorer Released 08-Aug-06 (Critical)
- KB921883: MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
- KB917159: MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution Released 11-Jul-06 (Critical)
- KB917537: MS06-034: Vulnerability in Microsoft Internet Information Services using Active Server Pages Could Allow Remote Code Execution Released 11-Jul-06 (Important)
- KB917953: MS06-032: Vulnerability in TCP/IP Could Allow Remote Code Execution Released 13-Jun-06 (Important)
- KB917734: MS06-024: Vulnerability in Windows Media Player Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
- KB917344: MS06-023: Vulnerability in Microsoft JScript Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
- KB916281: MS06-021: Cumulative Security Update for Internet Explorer Released 13-Jun-06 (Critical)
- KB913433: MS06-020: Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution Released 09-May-06 (Critical)
- KB911567: MS06-016: Cumulative Security Update for Outlook Express Released 11-Apr-06 (Important)
- KB912812: MS06-013: Cumulative Security Update for Internet Explorer Released 11-Apr-06 (Critical)
- KB913446: MS06-007: Vulnerability in TCP/IP Could Allow Denial of Service Released 10-May-06 (Important)
- KB912919: MS06-001: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution Released 6-Jan-06 (Critical)
- KB905915: MS05-054: Cumulative Security Update for Internet Explorer Released 13-Dec-05 (Critical)
- KB896424: MS05-053: Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution Released 8-Nov-05 (Critical)
-
KB896688: MS05-052: Cumulative Security Update for Internet Explorer Released 29-Dec-05 (Critical)
- KB904706: MS05-050: Vulnerability in DirectShow Could Allow Remote Code Execution Released 29-Dec-05 (Critical)
- KB899589: MS05-046: Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution Released 29-Dec-05 (Important)
- KB899588: MS05-039: Vulnerability in Plug and Play Could Allow Remote Code Execution and Elevation of Privilege Released 14-Aug-05 (Critical)
- KB896727: MS05-038: Cumulative Security Update for Internet Explorer for Windows XP Service Pack 2 Released 14-Aug-05 (Critical)
- KB903235: MS05-037: Vulnerability in JView Profiler Could Allow Remote Code Execution Released 14-Aug-05 (Critical)
- KB890046: MS05-032: Vulnerability in Microsoft Agent Could Allow Spoofing Released 14-Jun-05 (Moderate)
- KB896422: MS05-027: Vulnerability in Server Message Block Could Allow Remote Code Execution Released 14-Jun-05 (Critical)
- KB883939: MS05-025: Cumulative Security Update for Internet Explorer Released 14-Jun-05 (Critical)
- KB890923: MS05-020: Cumulative security update for Internet Explorer Released 12-Apr-05 (Important)
- KB893086: MS05-016: Vulnerability in Windows Shell that Could Allow Remote Code Execution Released 12-Apr-05 (Critical)
- KB888113: MS05-015: Vulnerability in Hyperlink Object Library Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
- KB873333: MS05-012: Vulnerability in OLE and COM Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
- KB885250: MS05-011: Vulnerability in Server Message Block Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
- KB890047: MS05-008: Vulnerability in Windows shell could allow remote code execution Released 8-Feb-05 (Important)
- KB890175: MS05-001: Vulnerability in HTML Help could allow code execution Released 11-Jan-05 (Critical)
- KB885932: Update for Internet Explorer 6 for XP Service Pack 2
- KB884020: Programs that connect to IP addresses that are in the loopback address range may not work as you expect in Windows XP Service Pack 2 Released Sep-04
- KB886185: Critical update for Windows Firewall "My Network (subnet) only" scoping in Windows XP Service Pack 2 Released 14-Dec-04 (Critical)
<!--
not security updates
-->
<!-- ******************************************************************** -->
The following security updates are not presently included:
<!-- ******************************************************************** -->
- KB923723: MS07-005: Vulnerability in Step-by-Step Interactive Training Could Allow Remote Code Execution Released 12-Feb-07 (Important)
- KB923789: MS06-069: Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution Released 14-Nov-06 (Critical)
- KB898458: MS05-031: Vulnerability in Step-by-Step Interactive Training Could Allow Remote Code Execution Released 14-Jun-05 (Important)
- KB893066: MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service Released 12-Apr-05 (Critical)
- KB890261: MS05-009: Vulnerability in PNG Processing Could Lead to Buffer Overrun Released 8-Feb-05 (Critical)
- KB887219: MS05-004: ASP.NET Path Validation Vulnerability Released 8-Feb-05 (Important)
- KB816093: MS03-011: Flaw in Microsoft VM Could Enable System Compromise Released 14-Dec-04 (Critical)
Fitting All the Hotfixes onto a 700MB CD
If you slipstream all of the hotfixes listed above, the resulting size will be greater than will fit on a single 700MB "80 minute" CD-R. There are two options to get around this limitation:1. Burn to a DVD instead of a CD. Of course, this isn't an option if the computer you are installing on does not have a DVD drive, or you don't have software to burn an .ISO file to a DVD.
2. Remove unneeded directories from the CD. On my Windows XP SP1 CD, I found I could delete the following directories before creating the .ISO:
D:\I386\WIN9XMIG: 33.5MB (Windows 9x migration files, not used when performing a fresh XP installation) D:\DOTNETFX: 33.1MB (.NET Framework, install this manually later if needed) D:\cmpnents 26.5MB (.NET Framework, TabletPC) D:\SUPPORT: 11.3MB (Support tools, not used by the installer) D:\VALUEADD: 9.1MB (Value added programs, not used by the installer) D:\I386\WIN9XUPG: 3.9MB (Windows 9x upgrade files, not used when performing a fresh XP installation) D:\DOCS: 0.1MB (Miscellaneous documents, not used by the installer)
If you don't need to install the Recovery Console, you can remove:
D:\I386\WINNTUPG: 1.0MB (Windows NT/2000 upgrade files, not used when performing a fresh XP installation)
If you don't need to install languages other than English, you can remove:
D:\I386\LANG: 101.7MB
If you remove all of the above directories, you will have reduced the size of the CD by over 223MB. Using my Windows XP SP1 disk, I went from 786MB, to 563MB, which easily fits on most sizes of CD-R media (see the table below).
Here is a table listing the different sizes of CD media. The sizes listed below I discovered empirically, and may vary depending on the type of media used.
Disk Type Size ------------------------ ----------- 80 minute/"700MB" CD-R 697,425,920 74 minute/"650MB" CD-R 642,883,584 80 minute/"700MB" CD-R/W 598,808,576 74 minute/"650MB" CD-R/W 557,260,800
Of course, using a program such as nLite, you can accomplish a far greater size reduction that what is listed above.
For more information, see:
http://unattended.msfn.org/unattended.xp/view/web/57/
http://pages.videotron.com/tbone/unattended/#_Toc79089721
Using Cygwin to Burn a Bootable CD
If you have, or install, Cygwin, you can build and burn a bootable CD, by editing the CD and CD_DEV variables at the beginning of xpsp2.mak, and typing: $ make -f xpsp2.mak You can also add the parameters on the command line: $ make -f xpsp3.mak CD=F: CD_DEV=0,0,0 If you include md5s.txt (updated 03-May-09), make will verify the files downloaded correctly before executing them. Note: KB885835 and KB885250 share the same file (mrxsmb.sys), so an error occurs if you attempt to slipstream both of them at once. These scripts solve this issue by superceeding KB885835's version of the file (5.1.2600.2541, xpsp_sp2_gdr.040919-1056, dated 10-27-2004, 448,128 bytes) with KB885250's version (5.1.2600.2598, xpsp_sp2_gdr.041130-1729, dated 1-18-2005, 451,584 bytes). Of course, to run make, you will need to install Cygwin and select the make, perl, and wget packages. To create a Windows XP boot disk with Service Pack 1a and Update Rollup 1 (KB826939), use xpsp1_ru.mak.Older Scripts
To create a Windows XP boot disk with only SP1a, use xpsp1.mak. To create a Windows 2000 boot disk with SP4, use w2k_sp4.mak.- ross's blog
- Login to post comments
zombo09,
I believe so, but I've never tried to slipstream XP Home. Please report back your experience if you try it.
RedSeo
I've upload w2ksp4.cmd. I doubt it's up to date, but it should provide a good start for you. Good luck.
ccf108:
I've updated all the scripts with the new URL:
http://download.microsoft.com/download/7/8/1/78141DC7-3B1D-42F3-9AA2-4DCA79AD739B/WindowsXP-KB938464-v2-x86-ENU.exe
Thanks for the heads up!
-Ross
pintree3,
If someone wants to slipstream SP3, then my SP2-based script will need to be modified to only apply post-SP3 hotfixes.
tovah1,
You are running under and administrator's account, yes?
First, the CD needs to be in the CD drive.
From what you have included, I can't determine what exactly is your problem, but I would try creating a directory in the root of C:, called say, xpsp2. Next, copy xpsp2.cmd into this directory. Then change to this directory, and execute xpsp2.cmd. Here's an example:
and follow the prompts.
tovah1
You can change xpsp2.mak to have this:
or you can create a separate file, called local.mak, in the same directory. If xpsp2.mak finds local.mak, it's settings will override whatever settings are in xpsp2.mak.
plabonte,
See comment 678
JerichoJones
Do you mean, the aria2c that I ported to Windows??? :)
grant33,
yes, it works with both Home and Pro.
Zarts,
xpsp2.mak requires Cygwin, and cdrecord to be installed. These are both command line tools, and not Windows GUI based applications, like UltraISO.
I've never tried using a pre-SP1 disk
Can you find an SP1, or SP2 disk, and see if the problem goes away?
Peter,
My goal is only to slipstream security hotfixes. There are many other programs I could slipstream, but then my script would not appeal to the broadest possible audience.
If you decide to add non-security related applications, send me a copy of the modified script, and I'll be happy to post it here.
Brian,
First off, xpsp2.cmd will abort with an error message if the hotfix returned an error during integration.
But if you really want to see if all is well, you could look at the file I386\svcpack\HFINT.DAT (on my system it's in D:\X1APCCP_EN\X1APCCP_EN\I386\svcpack\HFINT.DAT). This contains a list of all the hotfixes that have been slipstreamed.
I hope that answers your question.
bpeck,
Sorry, I don't use IE. I use firefox. Are you required to use IE?
You could try installing XP with only SP2 slipstreamed, then run xpsp2local.cmd to install the hotfixes one at a time until you find the hotfix that is causing the issues you are describing.
I know, that's a long and painful process, and you may not even find the problem after all that work.
Good luck,
Ross
janetkellman,
Here's the publisher's website: http://www.ezbsystems.com/easyboot.
BruceR,
Thanks for the positive feedback.
Unfortunately, it's been over 3 years since I wrote w2k_sp4.mak.
The downloads *should* be there but aren't. I'm not sure why they are missing. If I had more time, I would update the script, but as I don't use w2k any more, there isn't a compelling need.
If you would offer to provide a list of the hotfixes, I would be happy to modify the script for you.
Best,
Ross
BruceR,
Here's a list I found:
http://wud.jcarle.com/UpdateLists.aspx.
If I have time, I'll incorporate those hotfixes into my script.
-Ross
feld
I googled rpcrt.dll, and found nothing of interest. It's not on my system as well.
Perhaps you are referring to rpcrt4.dll? This file is on my system.
MS07-058: Vulnerability in RPC Could Allow Denial of Service (933729) updates this file.
If you go to http://www.microsoft.com/technet/security/Bulletin/MS07-058.mspx and click on "Security Update Deployment" / "Windows XP (all editions)" / "File Information", you see the following listed:
rpcrt4.dll 5.1.2600.3173 09-Jul-2007 13:09 584,192 SP2GDR
This is the version installed on my system.
I hope that helps diagnose the issues you are having.
-Ross
Michael,
I'm only including security hotfixes, sorry.
Michael,
I would be happy to offer assistance, but I don't plan on adding IE7, or danish support to my scripts.
-Ross
Kevin,
I don't use those OS's so I have no need for what you are desiring.
Unless Microsoft has changed the way they slipstream, it should be relatively easy to modify xpsp2.cmd for each OS you list.
Kevin,
I'm not certain, but I would assume that Microsoft hasn't changed the method of slipstreaming, so all you have to do is change the download URLs, and comment out, or remove the code regarding the XP SP2 download.
If you want, you could post your progress here, and I can try to help you.
Kevin,
That is an excellent question. Here's an example:
Curl will respond:
That is the actual download URL. Copy and paste that URL into your custom xpsp2.cmd script.
Another way to discover the download URL, is using a download manager program, such as FlashGet, or GetRight.
Please note, I only include security related hotfixes, as there are over 100 non-security related hotfixes for Windows XP.
eriko
Good idea. I'll add that to my next release.
gennerr,
KB905474 is not a security related hotfix, so I don't include it. Ryanvm *does* include it, with many other non-security related updates. Perhaps it would serve your needs better.
I could be wrong, but I believe a VLK keys can only be used with "Windows XP Corporate", and OEM keys can only be used with "Windows XP OEM".
-Ross
Mauro,
If only it was that easy. Microsoft, in their infinite wisdom, changes the file path, as well.
Please see http://smithii.com/slipstream_xpsp2#comment-197 for the URLs you need.
-Ross
jneff,
Fixed. My bad. Sorry.
cef,
The script will not download or apply the SP2 patch, if it has already been applied.
cef,
I just assumed a file named WIN51*.SP2 would exist. Can you determine if there is another file that is unique to SP2 that we can look for? Perhaps I386\sp2.cab?
in4ni2,
Please download the latest version and try again. Microsoft updated the URL (see the following post).
Kansei,
Fixed. Thanks for the heads up!
Kansei,
Personally, I have no idea. If you discover anything more, feel free to post your results here. Thanks!
Ray,
Re (1), type:
then replace the 1,0,0 in the command line, with the device you want to use. For example, when I type cdrecord -scanbus, I get the following:
So, if I want to use the Sony device on 1,0,0 I would set the CD_DEV variable at the top of xpsp2.mak to read CD_DEV=1,0,0. If I want the use the HP device, I would use CD_DEV=2,0,0.
If you don't want to keep remembering to update xpsp2.mak whenever a new release appears, create a file called local.mak, and include the variable there. For example, here's the local.mak I use:
Any of the variables in xpsp2.mak that are followed by ?= can be placed in local.mak.
Re (2), I would suggest run xpsp2.mak, and when it asks to "Insert a blank CD-R...", press Ctrl-C, delete the directories manually, and then re-run xpsp2.mak. It will pick up where it left off.
I can't add the directory deletion logic to the script, as we can't assume everyone is wanting to delete anything.
Ray,
Yes, you are correct. I will add these clarifications to the main article soon, so others can benefit from them.
Neil:
Listed below are the command line switches that all of the MS hotfixes (or patches as you call them) use.
xpsp2.cmd, which slipstreams the hotfixes, uses
while xpsp2local, which installs the hotfixes locally, uses only
As the /passive switch is used in both instances, you should never see any dialog boxes.
When you download the hotfixes, you need to save them in the directory that the script expects to see them in. If you don't you will see the "waiting..." message.
I hope that helps,
Ross
Neil:
The script will prompt you with:
Please save the downloaded hotfixes to this location.
If you install wget or curl into your system PATH, then the script will not prompt you at all!
Good luck,
-Ross
grt:
WindowsInstaller-KB893803-v2-x86.exe uses the standard hotfix switches (run WindowsInstaller-KB893803-v2-x86.exe /? to see them), so if you are modifying xpsp2.cmd or xpsp2local.cmd, add
after the last
If you are modifying xpsp2.mak, add:
right before
and
right after.
Thanks for the positive feedback.
qhartman:
I'm unable to duplicate the issues you are describing.
I used the latest xpsp2.mak, and an original Windows XP Pro SP1 disk (not OEM). I then installed Windows without a hitch.
Which updates?
mcai8rw2:
I agree, but there are currently over 100 non-security updates. Here are the ones RyanVM includes:
KB884575 KB885626 KB885835 KB886677 KB887606 KB888111 KB888302 KB889016 KB889320 KB889673 KB890046 KB890830 KB890859 KB891781 KB892489 KB893008 KB893803 KB894395 KB895961 KB896256 KB896344 KB896424 KB896626 KB897338 KB897663 KB898461 KB898543 KB899271 KB899409 KB899587 KB900485 KB900725 KB902149 KB902400 KB902845 KB902853 KB903234 KB903250 KB904412 KB904706 KB906216 KB906569 KB906866 KB907865 KB908536 KB909441 KB909520 KB909608 KB909667 KB910437 KB911565 KB911990 KB912024 KB912461 KB913296 KB914389 KB914440 KB914463 KB914841 KB914906 KB915378 KB915865 KB916595 KB917140 KB917275 KB917344 KB917422 KB917537 KB917730 KB917734 KB917953 KB918005 KB918033 KB918334 KB918997 KB920342 KB920872 KB921401 KB921411 KB922120 KB922582 KB922668 KB923154 KB923232 KB923293 KB923689 KB924496 KB924867 KB924941 KB925623 KB925720 KB925876 KB925922 KB926239 KB926247 KB926646 KB927544 KB927880 KB927891 KB928843 KB929280 KB931125 KB931192 KB931836 KB932590 KB932597 KB932662 KB933876 KB934161 KB935192 KB935214 KB935448 KB935843
I just don't have the time to find the download URLs for these. If someone wants to send me a list of x86-ENU URLs, I'd be happy to add them to the scripts.
Re: RSS issues
I don't think it's a Google Reader problem. I think it's an issue with Drupal, the content management system my site uses. It doesn't always update the change date, when I modify an item.
Thanks for your PayPal donation (which are never measly). The donations, and the Google ads, almost pay for my hosting charges.
Missing hotfixes
I just ran xpsp2local.cmd on a fresh SP2 install, and Microsoft Baseline Security Advisor (MBSA) reported the following updates are missing:
Unforuntately, MS06-069 Security Update for Flash Player (KB923789), is a non-standard hotfix, that does not use the same command line switches that the other hotfixes use.
Thanks for the feedback
Here's mine:
I'm attempting to include every security related hotfix
so unrelated patches may be included.
Thanks for the feedback
Here's mine:
It seems like it was there
but I regenerated and updated md5s.txt anyway, just to be sure.
Thanks,
Ross
Good catch
bbentley,
You're right, the script should not assume the registry key exists.
I've updated the script to not return an error if the key is not found.
Thanks,
Ross
msxml6-KB925673-enu-x86.exe has moved
It's now at
http://download.microsoft.com/download/b/e/1/be1f6217-8d74-4181-bc0d-7ad794ef3d69/msxml6-KB925673-enu-x86.exe
There are *many* hotfixes I'm not including
I'm just including the security hotfixes. http://www.ryanvm.net/msfn/updatepack.html has a great list of hotfixes.
To get the download URL, click on the hotfix link, then link for "IT Professionals", then "Windows XP Service Pack 2", then click on the download button. Be sure you're using a download utility such as GetRight, or FlashGet, to get the "final" URL.
I hope that helps,
-Ross
Is the wget program in your path?
It appears that xpsp2.cmd is having trouble finding the wget program on your system. Try reinstalling it.
Yes, you can
I searched Google for slipstream nero, and came up with http://www.winsupersite.com/showcase/windowsxp_sp2_slipstream.asp, which explains how to do it with Nero. These instructions should work with any CD burning software that can create a bootable CD.
The directory containing the slipstreamed files are by default in the directory you ran the script from. For me, it's name X1APCCP_EN as that's the volume ID of the CD I'm starting with.