DeutschEspañolFrançaisItalianoNederlandsPortuguêsΕλληνικάРусскийالعربية中文(简体)中文(繁體)日本語한국어
 
Donate Bitcoins
Google
 
www smithii.com
 

Automatically Slipstream Windows XP with SP2 and All Post-SP2 Security Hotfixes with a Single Command (Updated 03-May-09)

For information about slipstreaming Windows XP SP3, visit http://smithii.com/slipstream_xpsp3.

I've written the batch file xpsp2.cmd (updated 03-May-09) to automatically download and slipstream a standard Windows XP boot disk with Service Pack 2 and all post-SP2 security hotfixes.

It uses wget or curl (if either are found in the PATH), or your installed browser to download the updates. I have tested this with Internet Explorer, Firefox, and Opera. Other browsers should work, as well.

The batch file xpsp2local.cmd (updated 03-May-09) will update the copy of Windows XP that is installed on the computer you run the command on. You may wish to do this, if you do not have, or want, the machine you want to hotfix connected to the internet, or if you are unable to run Windows Update for some reason (for example, if Internet Explorer isn't installed, or doesn't work properly, due to a virus or similar mishap).

To slipstream the hotfixes, and burn the slipstreamed disk, I've created the makefile xpsp2.mak (updated 03-May-09). Details on usage below.

Microsoft XML Core Services Hotfixes

For Microsoft XML Core Services, run msxml_hotfixes.cmd (updated 24-Aug-07) to install the latest hotfixes locally.

Microsoft Office 2003 SP2 and Hotfixes

For Office 2003, run office_2003_hotfixes.cmd (updated 25-Aug-07) to install Service Pack 2, and all post-SP2 hotfixes locally.

The xpsp2* scripts listed above include the following security updates found at http://www.microsoft.com/technet/security/current.aspx:


Apr 09:

MS09-010 - Critical
Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code Execution (960477)
KB923561
SP2: replaces none
SP3: replaces none

MS09-013 - Critical
Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution (960803)
SP2: replaces none
SP3: replaces none

MS09-011 - Critical
Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (961373)
SP2: replaces MS08-033
SP3: replaces MS08-033

MS09-014 - Critical
Cumulative Security Update for Internet Explorer (963027)
SP2: replaces MS08-073, MS08-078
SP3: replaces MS08-073, MS08-078

MS09-012 - Important
Vulnerabilities in Windows Could Allow Elevation of Privilege (959454)
SP2: replaces MS07-022, MS08-002, MS08-064
SP3: replaces MS08-064

MS09-015 – Moderate
Blended Threat Vulnerability in SearchPath Could Allow Elevation of Privilege (959426)
SP2: replaces MS07-035
SP2: replaces MS07-035

Mar 09:

MS09-006 – Critical
Vulnerabilities in Windows Kernel Could Allow Remote Code Execution (958690)
SP2: replaces MS08-061
SP3: replaces MS08-061

MS09-007 - Important
Vulnerability in SChannel Could Allow Spoofing (960225)
SP2: replaces MS07-031
SP3: replaces none

Feb 09:

Jan 09:

MS09-001 – Critical
Vulnerabilities in SMB Could Allow Remote Code Execution (958687)
SP2: replaces MS08-063
SP3: replaces MS08-063

Dec 08:

MS08-071 – Critical
Vulnerabilities in GDI Could Allow Remote Code Execution (956802)
SP2: replaces MS08-021
SP3: replaces none

MS08-073 - Critical
Cumulative Security Update for Internet Explorer (958215)
SP2: replaces MS08-058
SP3: replaces MS08-058

MS08-076 – Important
Vulnerabilities in Windows Media Components Could Allow Remote Code Execution (959807)
SP2: replaces none
SP3: replaces none

MS08-078 - Critical
Security Update for Internet Explorer (960714)
SP2: replaces none
SP3: replaces none

Nov 08:

MS08-068 | Important
Vulnerability in SMB Could Allow Remote Code Execution (957097)
SP2: replaces MS05-011
SP3: replaces none

MS08-069 | Critical
Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (955218)
SP2: replaces MS06-042
SP3: replaces none

Oct 08:

MS08-058 - Critical
Cumulative Security Update for Internet Explorer (956390)
SP2: replaces MS08-045
SP3: replaces MS08-045

MS08-061 – Important
Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (954211)
SP2: replaces MS08-025
SP3: replaces none

MS08-062 - Important
Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution (953155)
SP2: replaces none
SP3: replaces none

MS08-063 – Important
Vulnerability in SMB Could Allow Remote Code Execution (957095)
SP2: replaces MS06-063
SP3: replaces none

MS08-064 – Important
Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege (956841)
SP2: replaces MS07-022
SP3: replaces none

MS08-066 – Important
Vulnerability in the Microsoft Ancillary Function Driver Could Allow Elevation of Privilege (956803)
SP2: replaces none
SP3: replaces none

MS08-067 – Critical
Vulnerability in Server Service Could Allow Remote Code Execution (958644)
SP2: replaces MS06-040
SP3: replaces none

Sep 08:

MS08-052 - Critical
Vulnerabilities in GDI+ Could Allow Remote Code Execution (954593)
SP2: replaces none
SP3: replaces none

MS08-053 - Critical
Vulnerability in Windows Media Encoder 9 Could Allow Remote Code Execution (954156)
SP2: replaces none
SP3: replaces none

MS08-054 - Critical
Vulnerability in Windows Media Player Could Allow Remote Code Execution (954154)
SP2: replaces none
SP3: replaces none

Aug 08:

MS08-045 - Critical
Cumulative Security Update for Internet Explorer (953838)
SP2: replaces MS08-031
SP3: replaces MS08-031

MS08-046 - Critical
Vulnerability in Microsoft Windows Image Color Management System Could Allow Remote Code Execution (952954)
SP2: replaces none
SP3: replaces none

MS08-048 - Important
Security Update for Outlook Express and Windows Mail (951066)
SP2: replaces none
SP3: replaces none

MS08-049 - Important
Vulnerabilities in Event System Could Allow Remote Code Execution (950974)
SP2: replaces none
SP3: replaces none

MS08-050 - Important
Vulnerability in Windows Messenger Could Allow Information Disclosure (955702)
SP2: replaces none
SP3: replaces none

Jul 08:

MS08-037 - Important
Vulnerabilities in DNS Could Allow Spoofing (953230)
SP2: replaces MS06-064, MS08-001
SP3: replaces none

Jun 08:

MS08-030 - Critical
Vulnerability in Bluetooth Stack Could Allow Remote Code Execution (951376)
SP2: replaces none
SP3: replaces none

MS08-031 - Critical
Cumulative Security Update for Internet Explorer (950759)
SP2: replaces MS08-024
SP3: replaces none
replaced by MS08-45

MS08-032 - Moderate
Cumulative Security Update of ActiveX Kill Bits (950760)
SP2: replaces MS08-023
SP3: replaces none

MS08-033 - Critical
Vulnerabilities in DirectX Could Allow Remote Code Execution (951698)
SP2: replaces MS07-064
SP3: replaces none

MS08-035 - Important
Vulnerability in Active Directory Could Allow Denial of Service (953235)
SP2: replaces MS08-003
SP3: replaces none

MS08-036 - Important
Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service (950762)
SP2: replaces MS06-052
SP3: replaces none
  1. KB941693: MS08-025: Vulnerability in Windows Kernel Could Allow Elevation of Privilege Release 08-Apr-08 (Important)
  2. KB944338: MS08-022: Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution Release 08-Apr-08 (Critical)
  3. KB948590: MS08-021: Vulnerabilities in GDI Could Allow Remote Code Execution Release 08-Apr-08 (Critical)
  4. KB945553: MS08-020: Vulnerability in DNS Client Could Allow Spoofing Release 08-Apr-08 (Important)
  5. <!-- Feb, 2008: http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx -->

  6. KB947890: MS08-008: Vulnerability in OLE Automation Could Allow Remote Code Execution Released 12-Feb-08 (Critical)
  7. KB946026: MS08-007: Vulnerability in WebDAV Mini-Redirector Could Allow Remote Code Execution Released 12-Feb-08 (Critical)
  8. KB942830: MS08-006: Vulnerability in Internet Information Services Could Allow Remote Code Execution Released 12-Feb-08 (Important)
  9. KB942831: MS08-005: Vulnerability in Internet Information Services Could Allow Elevation of Privilege Released 12-Feb-08 (Important)
  10. <!-- Jan, 2008: http://www.microsoft.com/technet/security/bulletin/ms08-jan.mspx -->

  11. KB943485: MS08-002: Vulnerability in LSASS Could Allow Local Elevation of Privilege Released 08-Jan-08 (Important)
  12. <!-- Dec, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-dec.mspx -->

  13. KB941569: MS07-068: Vulnerability in Windows Media File Format Could Allow Remote Code Execution Released 11-Dec-07 (Critical)
  14. KB944653: MS07-067: Vulnerability in Macrovision Driver Could Allow Local Elevation of Privilege Released 11-Dec-07 (Important)
  15. KB937894: MS07-065: Vulnerability in Message Queuing Could Allow Remote Code Execution Released 11-Dec-07 (Important)
  16. <!-- Nov, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-nov.mspx -->

  17. KB943460: MS07-061: Vulnerability in Windows URI Handling Could Allow Remote Code Execution Released 13-Nov-07 (Critical)
  18. <!-- Oct, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-oct.mspx -->

  19. KB933729: MS07-058: Vulnerability in RPC Could Allow Denial of Service Released 09-Oct-07 (Important)
  20. KB941202: MS07-056: Security Update for Outlook Express and Windows Mail Released 09-Oct-07 (Critical)
  21. KB923810: MS07-055: Vulnerability in Kodak Image Viewer Could Allow Remote Code Execution Released 09-Oct-07 (Critical)
  22. <!-- Aug, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-aug.mspx -->

  23. KB938127: MS07-050: Vulnerability in Vector Markup Language Could Allow Remote Code Execution Released 14-Aug-07 (Important)
  24. KB936782: MS07-047: Vulnerability in Windows Media Player Could Allow Remote Code Execution Released 14-Aug-07 (Critical)
  25. <!-- Jul, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-jul.mspx -->

  26. KB939373: MS07-041: Vulnerability in Microsoft Internet Information Services Could Allow Remote Code Execution Released 20-Jul-07 (Important)
  27. <!-- June, 2007: http://www.microsoft.com/technet/security/bulletin/ms10-jun.mspx -->

  28. KB935839: MS07-035: Vulnerability in Win32 API Could Allow Remote Code Execution Released 12-Jun-07 (Critical)
  29. KB929123: MS07-034: Cumulative Security Update for Outlook Express and Windows Mail Released 12-Jun-07 (Critical)
  30. KB935840: MS07-031: Vulnerability in the Windows Schannel Security Package Could Allow Remote Code Execution Released 12-Jun-07 (Critical)
  31. <!-- May, 2007: http://www.microsoft.com/technet/security/bulletin/ms10-may.mspx -->

    <!-- April, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-apr.mspx -->

  32. KB931784: MS07-022: Vulnerability in Windows Kernel Could Allow Elevation of Privilege Released 07-Apr-07 (Important)
  33. KB930178: MS07-021: Vulnerabilities in CSRSS Could Allow Remote Code Execution Released 07-Apr-07 (Critcal)
  34. KB932168: MS07-020: Vulnerability in Microsoft Agent Could Allow Remote Code Execution Released 07-Apr-07 (Critcal)
  35. KB931261: MS07-019: Vulnerability in Universal Plug and Play Could Allow Remote Code Execution Released 07-Apr-07 (Critcal)
  36. KB925902: MS07-017: Security Update for Windows XP Released 03-Apr-07 (Critcal)
  37. <!-- February, 2007: http://www.microsoft.com/technet/security/bulletin/ms07-feb.mspx -->

  38. KB918118: MS07-013: Vulnerability in Microsoft RichEdit Could Allow Remote Code Execution Released 12-Feb-07 (Important)
  39. KB924667: MS07-012: Vulnerability in Microsoft MFC Could Allow Remote Code Execution Released 12-Feb-07 (Important)
  40. KB926436: MS07-011: Vulnerability in Microsoft OLE Dialog Could Allow Remote Code Execution (Important) Released 12-Feb-07 (Important)
  41. KB927779: MS07-009: Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution Released 12-Feb-07 (Critical)
  42. KB928843: MS07-008: Vulnerability in HTML Help ActiveX Control Could Allow Remote Code Execution Released 12-Feb-07 (Critical)
  43. KB927802: MS07-007: Vulnerability in Windows Image Acquisition Service Could Allow Elevation of Privilege Released 12-Feb-07 (Important)
  44. KB928255: MS07-006: Vulnerability in Windows Shell Could Allow Elevation of Privilege Released 12-Feb-07 (Important)
  45. <!-- December, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-dec.mspx -->

  46. KB926255: MS06-075: Vulnerability in Windows Could Allow Elevation of Privilege Released 12-Dec-06 (Important)
  47. KB926247: MS06-074: Vulnerability in SNMP Could Allow Remote Code Execution Released 12-Dec-06 (Important)
  48. <!-- November, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-nov.mspx -->

  49. KB924270: MS06-070: Vulnerability in Workstation Service Could Allow Remote Code Execution Released 14-Nov-06 (Critical)
  50. KB920213: MS06-068: Vulnerability in Microsoft Agent Could Allow Remote Code Execution Released 14-Nov-06 (Critical)
  51. KB923980: MS06-066: Vulnerabilities in Client Service for NetWare Could Allow Remote Code Execution Released 14-Nov-06 (Important)
  52. <!-- October, 2006: http://www.microsoft.com/technet/security/bulletin/ms08-oct.mspx -->

  53. KB924496: MS06-065: Vulnerability in Windows Object Packager Could Allow Remote Execution Released 10-Oct-06 (Moderate)
  54. KB923414: MS06-063: Vulnerability in Server Service Could Allow Denial of Service and Remote Code Execution Released 10-Oct-06 (Important)
  55. KB924191: MS06-061: Vulnerabilities in Microsoft XML Core Services could allow remote code execution Released 10-Oct-06 (Critical)
  56. KB923191: MS06-057: Vulnerability in Windows Explorer Could Allow Remote Execution Released 10-Oct-06 (Critical)
  57. <!-- September, 2006: http://www.microsoft.com/technet/security/bulletin/ms07-sep.mspx -->

  58. KB920685: MS06-053: Vulnerability in Indexing Service Could Allow Cross-Site Scripting Released 12-Sep-06 (Moderate)
  59. <!-- August, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-aug.mspx -->

  60. KB920670: MS06-050: Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution  Released 08-Aug-06 Important)
  61. KB920683: MS06-041: Vulnerability in DNS Resolution Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
  62. <!-- July, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-jul.mspx -->

  63. KB914388: MS06-036: Vulnerability in DHCP Client Service Could Allow Remote Code Execution Released 11-Jul-06 (Critical)
  64. <!-- June, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-jun.mspx -->

  65. KB914389: MS06-030: Vulnerability in Server Message Block Could Allow Elevation of Privilege Released 13-Jun-06 (Important)
  66. KB911280: MS06-025: Vulnerability in Routing and Remote Access Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
  67. KB918439: MS06-022: Vulnerability in ART Image Rendering Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
  68. <!-- May, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-may.mspx -->

  69. KB913580: MS06-018: Vulnerability in Microsoft Distributed Transaction Coordinator could allow denial of service Released 09-May-06 (Moderate)
  70. <!-- April, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-apr.mspx -->

  71. KB908531: MS06-015: Vulnerability in Windows Explorer Could Allow Remote Code Execution Released 11-Apr-06 (Updated 25-Apr-06) (Critical)
  72. KB911562: MS06-014: Vulnerability in Microsoft Data Access Components (MDAC) function could allow code execution Released 11-Apr-06 (Updated 11-May-06) (Critical)
  73. <!-- February, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-feb.mspx -->

  74. KB901190: MS06-009: Vulnerability in the Korean Input Method Editor (IME) could allow elevation of privilege Released 10-May-06 (Important)
  75. KB911927: MS06-008: Vulnerability in Web Client Service Could Allow Remote Code Execution Released 10-May-06 (Important)
  76. KB911564: MS06-006: Vulnerability in Windows Media Player Plug-in with Non-Microsoft Internet Browsers Could Allow Remote Code Execution Released 10-May-06 (Important)
  77. KB911565: MS06-005: Vulnerability in Windows Media Player 9 Could Allow Remote Code Execution Released 10-May-06 (Critical)
  78. <!-- January, 2006: http://www.microsoft.com/technet/security/bulletin/ms06-jan.mspx -->

  79. KB908519: MS06-002: Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution Released 11-Jan-06 (Critical)
  80. <!-- November, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-nov.mspx -->

  81. KB902400: MS05-051: Vulnerabilities in MS DTC and COM+ could allow remote code execution Released 8-Nov-05 (Critical)
  82. <!-- October, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-oct.mspx -->

  83. KB900725: MS05-049: Vulnerabilities in the Windows shell could allow for remote code execution Released 29-Dec-05 (Important)
  84. KB901017: MS05-048: Vulnerability in the Microsoft Collaboration Data Objects Could Allow Remote Code Execution Released 29-Dec-05 (Important)
  85. KB905749: MS05-047: Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege Released 29-Dec-05 (Important)
  86. KB905414: MS05-045: Vulnerability in Network Connection Manager Could Allow Denial of Service Released 29-Dec-05 (Moderate)
  87. <!-- August, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-aug.mspx -->

  88. KB896423: MS05-043: Vulnerability in Print Spooler Service Could Allow Remote Code Execution Released 14-Aug-05 (Critical)
  89. KB899587: MS05-042: Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing Released 14-Aug-05 (Moderate)
  90. KB899591: MS05-041: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service Released 14-Aug-05 (Moderate)
  91. KB893756: MS05-040: Vulnerability in Telephony Service Could Allow Remote Code Execution Released 14-Aug-05 (Important)
  92. <!-- July, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-jul.mspx -->

  93. KB901214: MS05-036: Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution Released 12-Jul-05 (Critical)
  94. <!-- June, 2005: http://www.microsoft.com/technet/security/bulletin/ms05-jun.mspx -->

  95. KB896428: MS05-033: Vulnerability in Telnet Client Could Allow Information Disclosure Released 14-Jun-05 (Moderate)
  96. KB890046: MS05-032: Vulnerability in Microsoft Agent Could Allow Spoofing Released 14-Jun-05 (Moderate)
  97. KB896358: MS05-026: Vulnerability in HTML Help Could Allow Remote Code Execution Released 14-Jun-05 (Critical)
  98. <!-- April, 2005 -->

  99. KB890859: MS05-018: Vulnerabilities in Windows kernel Could Allow Elevation of Privilege and Denial of Service Released 12-Apr-05 (Important)
  100. <!-- February, 2005 -->

  101. KB891781: MS05-013: Vulnerability in the DHTML Editing Component ActiveX Control Could Allow Code Execution Released 8-Feb-05 (Critical)
  102. KB887472: MS05-009: Vulnerability in PNG Processing Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
  103. KB888302: MS05-007: Vulnerability in Windows Could Allow Information Disclosure Released 8-Feb-05 (Important)
  104. <!-- December, 2004 -->

  105. KB885835: MS04-044: Vulnerabilities in Windows Kernel and LSASS Could Allow Elevation of Privilege Released 14-Dec-04 (Important)
  106. KB873339: MS04-043: Vulnerability in HyperTerminal Could Allow Code Execution Released 14-Dec-04 (Important)
  107. KB885836: MS04-041: A Vulnerability in WordPad Could Allow Code Execution Released 14-Dec-04 (Important)
  108. <!-- August, 2004 -->

  109. KB835935: Windows XP Service Pack 2 Released 24-Aug-04

<!-- ******************************************************************** -->
These updates are not included as they have been superceeded by a following update:
<!-- ******************************************************************** -->

  1. KB947864: MS08-024: Cumulative Security Update for Internet Explorer Release 08-Apr-08 (Critical)
  2. KB948881: MS08-023: Security Update of ActiveX Kill Bits Release 08-Apr-08 (Critical)
  3. KB944533: MS08-010: Cumulative Security Update for Internet Explorer Released 12-Feb-08 (Critical)
  4. KB946538: MS08-003: Vulnerability in Active Directory Could Allow Denial of Service Released 12-Feb-08 (Important)
  5. KB941644: MS08-001: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution Released 08-Jan-08 (Critical)
  6. KB938829: MS07-046: Vulnerability in GDI Could Allow Remote Code Execution Released 14-Aug-07 (Critical)
  7. KB942615: MS07-069: Cumulative Security Update for Internet Explorer Released 11-Dec-07 (Critical)
  8. KB941568: MS07-064: Vulnerabilities in DirectX Could Allow Remote Code Execution Released 11-Dec-07 (Critical)
  9. KB939653: MS07-057: Cumulative Security Update for Internet Explorer Released 09-Oct-07 (Critical)
  10. KB937143: MS07-045: Cumulative Security Update for Internet Explorer Released 14-Aug-07 (Critical)
  11. KB921503: MS07-043: Vulnerability in OLE Automation Could Allow Remote Code Execution Released 14-Aug-07 (Critical)
  12. KB933566: MS07-033: Cumulative Security Update for Internet Explorer Released 12-Jun-07 (Critical)
  13. KB931784: MS07-027: Cumulative Security Update for Internet Explorer Released 08-May-07 (Critical)
  14. KB928090: MS07-016: Cumulative Security Update for Internet Explorer Released 12-Feb-07 (Critical)
  15. KB929969: MS07-004: Vulnerability in Vector Markup Language Could Allow Remote Code Execution Released 09-Jan-07 (Critical)
  16. KB923689: MS06-078: Vulnerability in Windows Media Format Could Allow Remote Code Execution Released 12-Dec-06 (Critical)
  17. KB923694: MS06-076: Cumulative Security Update for Outlook Express Released 12-Dec-06 (Important)
  18. KB925454: MS06-072: Cumulative Security Update for Internet Explorer Released 12-Dec-06 (Critical)
  19. KB922760: MS06-067: Cumulative Security Update for Internet Explorer Released 14-Nov-06 (Critical)
  20. KB925486: MS06-055: Vulnerability in Vector Markup Language Could Allow Remote Code Execution Released 12-Sep-06 (Critical)
  21. KB922819: MS06-064: Vulnerabilities in TCP/IP IPv6 Could Allow Denial of Service Released 10-Oct-06 (Low)
  22. KB919007: MS06-052: Vulnerability in Reliable Multicast Program (PGM) Could Allow Remote Code Execution Released 12-Sep-06 (Important)
  23. KB917422: MS06-051: Vulnerability in Windows Kernel Could Result in Remote Code Execution Released 08-Aug-06 (Critical)
  24. KB922616: MS06-046: Vulnerability in HTML Help Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
  25. KB921398: MS06-045: Vulnerability in Windows Explorer Could Allow Remote Code Execution  Released 08-Aug-06 Important)
  26. KB920214: MS06-043: Vulnerability in Microsoft Windows Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
  27. KB918899: MS06-042: Cumulative Security Update for Internet Explorer Released 08-Aug-06 (Critical)
  28. KB921883: MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution Released 08-Aug-06 (Critical)
  29. KB917159: MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution Released 11-Jul-06 (Critical)
  30. KB917537: MS06-034: Vulnerability in Microsoft Internet Information Services using Active Server Pages Could Allow Remote Code Execution Released 11-Jul-06 (Important)
  31. KB917953: MS06-032: Vulnerability in TCP/IP Could Allow Remote Code Execution Released 13-Jun-06 (Important)
  32. KB917734: MS06-024: Vulnerability in Windows Media Player Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
  33. KB917344: MS06-023: Vulnerability in Microsoft JScript Could Allow Remote Code Execution Released 13-Jun-06 (Critical)
  34. KB916281: MS06-021: Cumulative Security Update for Internet Explorer Released 13-Jun-06 (Critical)
  35. KB913433: MS06-020: Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution Released 09-May-06 (Critical)
  36. KB911567: MS06-016: Cumulative Security Update for Outlook Express Released 11-Apr-06 (Important)
  37. KB912812: MS06-013: Cumulative Security Update for Internet Explorer Released 11-Apr-06 (Critical)
  38. KB913446: MS06-007: Vulnerability in TCP/IP Could Allow Denial of Service Released 10-May-06 (Important)
  39. KB912919: MS06-001: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution Released 6-Jan-06 (Critical)
  40. KB905915: MS05-054: Cumulative Security Update for Internet Explorer Released 13-Dec-05 (Critical)
  41. KB896424: MS05-053: Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution Released 8-Nov-05 (Critical)
  42. KB896688: MS05-052: Cumulative Security Update for Internet Explorer Released 29-Dec-05 (Critical)
  43. KB904706: MS05-050: Vulnerability in DirectShow Could Allow Remote Code Execution Released 29-Dec-05 (Critical)
  44. KB899589: MS05-046: Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution Released 29-Dec-05 (Important)
  45. KB899588: MS05-039: Vulnerability in Plug and Play Could Allow Remote Code Execution and Elevation of Privilege Released 14-Aug-05 (Critical)
  46. KB896727: MS05-038: Cumulative Security Update for Internet Explorer for Windows XP Service Pack 2 Released 14-Aug-05 (Critical)
  47. KB903235: MS05-037: Vulnerability in JView Profiler Could Allow Remote Code Execution Released 14-Aug-05 (Critical)
  48. KB890046: MS05-032: Vulnerability in Microsoft Agent Could Allow Spoofing Released 14-Jun-05 (Moderate)
  49. KB896422: MS05-027: Vulnerability in Server Message Block Could Allow Remote Code Execution Released 14-Jun-05 (Critical)
  50. KB883939: MS05-025: Cumulative Security Update for Internet Explorer Released 14-Jun-05 (Critical)
  51. KB890923: MS05-020: Cumulative security update for Internet Explorer Released 12-Apr-05 (Important)
  52. KB893086: MS05-016: Vulnerability in Windows Shell that Could Allow Remote Code Execution Released 12-Apr-05 (Critical)
  53. KB888113: MS05-015: Vulnerability in Hyperlink Object Library Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
  54. KB873333: MS05-012: Vulnerability in OLE and COM Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
  55. KB885250: MS05-011: Vulnerability in Server Message Block Could Allow Remote Code Execution Released 8-Feb-05 (Critical)
  56. KB890047: MS05-008: Vulnerability in Windows shell could allow remote code execution Released 8-Feb-05 (Important)
  57. KB890175: MS05-001: Vulnerability in HTML Help could allow code execution Released 11-Jan-05 (Critical)
  58. <!--
    not security updates

  59. KB885932: Update for Internet Explorer 6 for XP Service Pack 2
  60. KB884020: Programs that connect to IP addresses that are in the loopback address range may not work as you expect in Windows XP Service Pack 2 Released Sep-04
  61. KB886185: Critical update for Windows Firewall "My Network (subnet) only" scoping in Windows XP Service Pack 2 Released 14-Dec-04 (Critical)
  62. -->

<!-- ******************************************************************** -->
The following security updates are not presently included:
<!-- ******************************************************************** -->

  1. KB923723: MS07-005: Vulnerability in Step-by-Step Interactive Training Could Allow Remote Code Execution Released 12-Feb-07 (Important)
  2. KB923789: MS06-069: Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution Released 14-Nov-06 (Critical)
  3. KB898458: MS05-031: Vulnerability in Step-by-Step Interactive Training Could Allow Remote Code Execution Released 14-Jun-05 (Important)
  4. KB893066: MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service Released 12-Apr-05 (Critical)
  5. KB890261: MS05-009: Vulnerability in PNG Processing Could Lead to Buffer Overrun Released 8-Feb-05 (Critical)
  6. KB887219: MS05-004: ASP.NET Path Validation Vulnerability Released 8-Feb-05 (Important)
  7. KB816093: MS03-011: Flaw in Microsoft VM Could Enable System Compromise Released 14-Dec-04 (Critical)

Please let me know if you feel I've missed an important update.

Fitting All the Hotfixes onto a 700MB CD

If you slipstream all of the hotfixes listed above, the resulting size will be greater than will fit on a single 700MB "80 minute" CD-R. There are two options to get around this limitation:

1. Burn to a DVD instead of a CD. Of course, this isn't an option if the computer you are installing on does not have a DVD drive, or you don't have software to burn an .ISO file to a DVD.

2. Remove unneeded directories from the CD. On my Windows XP SP1 CD, I found I could delete the following directories before creating the .ISO:

D:\I386\WIN9XMIG: 33.5MB (Windows 9x migration files, not used when performing a fresh XP installation)
D:\DOTNETFX:      33.1MB (.NET Framework, install this manually later if needed)
D:\cmpnents       26.5MB (.NET Framework, TabletPC)
D:\SUPPORT:       11.3MB (Support tools, not used by the installer)
D:\VALUEADD:       9.1MB (Value added programs, not used by the installer)
D:\I386\WIN9XUPG:  3.9MB (Windows 9x upgrade files, not used when performing a fresh XP installation)
D:\DOCS:           0.1MB (Miscellaneous documents, not used by the installer)

If you don't need to install the Recovery Console, you can remove:

D:\I386\WINNTUPG:  1.0MB (Windows NT/2000 upgrade files, not used when performing a fresh XP installation)

If you don't need to install languages other than English, you can remove:

D:\I386\LANG:    101.7MB

If you remove all of the above directories, you will have reduced the size of the CD by over 223MB. Using my Windows XP SP1 disk, I went from 786MB, to 563MB, which easily fits on most sizes of CD-R media (see the table below).

Here is a table listing the different sizes of CD media. The sizes listed below I discovered empirically, and may vary depending on the type of media used.

Disk Type                       Size
------------------------ -----------
80 minute/"700MB" CD-R   697,425,920
74 minute/"650MB" CD-R   642,883,584
80 minute/"700MB" CD-R/W 598,808,576
74 minute/"650MB" CD-R/W 557,260,800

Of course, using a program such as nLite, you can accomplish a far greater size reduction that what is listed above.

For more information, see:

http://unattended.msfn.org/unattended.xp/view/web/57/
http://pages.videotron.com/tbone/unattended/#_Toc79089721

Using Cygwin to Burn a Bootable CD

If you have, or install, Cygwin, you can build and burn a bootable CD, by editing the CD and CD_DEV variables at the beginning of xpsp2.mak, and typing:

$ make -f xpsp2.mak

You can also add the parameters on the command line:

$ make -f xpsp3.mak CD=F: CD_DEV=0,0,0

If you include md5s.txt (updated 03-May-09), make will verify the files downloaded correctly before executing them.

Note: KB885835 and KB885250 share the same file (mrxsmb.sys), so an error occurs if you attempt to slipstream both of them at once. These scripts solve this issue by superceeding KB885835's version of the file (5.1.2600.2541, xpsp_sp2_gdr.040919-1056, dated 10-27-2004, 448,128 bytes) with KB885250's version (5.1.2600.2598, xpsp_sp2_gdr.041130-1729, dated 1-18-2005, 451,584 bytes).

Of course, to run make, you will need to install Cygwin and select the make, perl, and wget packages.

To create a Windows XP boot disk with Service Pack 1a and Update Rollup 1 (KB826939), use xpsp1_ru.mak.

Older Scripts

To create a Windows XP boot disk with only SP1a, use xpsp1.mak.

To create a Windows 2000 boot disk with SP4, use w2k_sp4.mak.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Great Stuff, Ross !!!

Hi, Ross ~~
Two things. First and foremost, major kudos for (a) all of the great work you've done developing these scripts; (b) your long term commitment to keeping things up to date; and (c) your patience in answering the comments. Awesome, awesome stuff !!!

Secondly, a question ... is w2k_sp4.mak intended to download & slipstream Windows 2000 post-SP4 security hotfixes? If so, what is pointing to the list of hotfixes? I am not seeing it, especially when I compare this mak file to xpsp2.mak. I need to support slipstreamed hotfixes for both XP sp2 & 2000 sp4 and I'd like to put together a cmd script for 2000 similar to the one you have for XP; hence the need for understanding where to start looking for the 2000 post-SP4 hotfixes.

Thanks in advance and, again, great work.
BruceR

BruceR,

Thanks for the positive feedback.

Unfortunately, it's been over 3 years since I wrote w2k_sp4.mak.

The downloads *should* be there but aren't. I'm not sure why they are missing. If I had more time, I would update the script, but as I don't use w2k any more, there isn't a compelling need.

If you would offer to provide a list of the hotfixes, I would be happy to modify the script for you.

Best,

Ross

Your Momma Didn't Raise No Fool

Hi, Ross ~~

Um-hmmm ... yep ... I see you working ... you want the easy part ... ;)

No worries. Just gotta figure out a way to figure what the 2k hotfixes are and where they reside. I was mostly hoping you already had all that knowledge. With that list, modifying the script is pretty straight forward. I can't think of any reason to use something other than wget & Integrate for retrieval & slipstreaming -- do you agree ??? The steps should be pretty similar with the primary concern being to make sure to use separate directories from the XP directories.

Thanks again. I'll let you know what I come up with.

Alleleuia,
BruceR

BruceR,

Here's a list I found:

http://wud.jcarle.com/UpdateLists.aspx.

If I have time, I'll incorporate those hotfixes into my script.

-Ross

2 hotfixes fail (don't support /integrate)

The files msxml6-KB933579-enu-x86.exe and msxml4-KB936181-enu.exe which are called by w2k_sp4.mak give error messages when called. It looks like they do not support the "/integrate" command line parameter.

Running:

touch msxml6-KB933579-enu-x86.exe.touch
touch msxml4-KB936181-enu.exe.touch

before "make -f w2k_sp4.mak" avoids the problem, but you might want to remove those two hotfixes. (Or if there is another way to integrate them, I would appreciate learning how.)

BTW, both the XP and W2K make files are great!

Richard

WARNING: MAJOR ISSUE! BE WARY!

Ross,

I have used this method to slipstream the hotfixes while using an official XP SP2 CD as the source of the installation content. I have come across one major issue that has taken me quite a while to troubleshoot -- I never imagined it was the installation CD that was causing my troubles.

I had an issue where I could not login to an Exchange server over HTTP/SSL with Outlook. After hours of troubleshooting I found the real issue: the rpcrt.dll file is not updated -- there are likely several updates not included with your slipstream method. Without an updated rpcrt.dll file (whose version should match the OS's), RPC malfunctions.

I hope you can use this information to track down any bugs in your process so I can use this slipstream method once again! (I think it is the best one I've found).

Thanks!

feld

I googled rpcrt.dll, and found nothing of interest. It's not on my system as well.

Perhaps you are referring to rpcrt4.dll? This file is on my system.

MS07-058: Vulnerability in RPC Could Allow Denial of Service (933729) updates this file.

If you go to http://www.microsoft.com/technet/security/Bulletin/MS07-058.mspx and click on "Security Update Deployment" / "Windows XP (all editions)" / "File Information", you see the following listed:

rpcrt4.dll 5.1.2600.3173 09-Jul-2007 13:09 584,192 SP2GDR

This is the version installed on my system.

I hope that helps diagnose the issues you are having.

-Ross

Missing Patch MD5s

KB939653 is missing from the MD5 file

using wmp11 slipstreamer in conjuction with this batch

hi all,

wondering if anyone has used boooggy's windows media player 11 slipstreamer in conjuction with this hotfix slipstreamer batch.

the process i'm currently following is running the hotfix slipstreamer, then using the wmp11 slipstreamer to slipstream wmp11 and hotfix kb939683.

during the 'registering components' phase of the windows installation, i'm receiving an error regarding icfgnt.dll. i have tested the install without wmp11 slipstreamed and it works fine.

is anyone employing a process to make these two slipstreamers work happily together they'd care to share?

What about the 3 required patches for Microsoft Update ??

Hello.

How do I implement the following patches:

Windows Installer 3.1
Update for Windows XP (KB898461)
Windows Genuine Advantage Validator Tool (KB892130)

Hope that someone can help.

TeGBakke

Adding Something to the Batch

If I wanted to add something, like the .net packages, how would I go about that? I have the direct download links already. I tried following the same concept of the other files listed but it doesn't complete the script anymore. It just closes the command prompt after copying the files from the windows cd. If you could write me an example, possibly for
.NET 1.1: "http://download.microsoft.com/download/a/a/c/aac39226-8825-44ce-90e3-bf8203e74006/dotnetfx.exe"

Great Work!

it took me a while to figure out how to run the cmd script and set-up wget, but after 20 min or so, I got it up and running. needless to say, I had a fully slipstreamed xp install disk in 15 min tops. that was the most pain-free xp install I have ever done, thanks a ton!

Novice trying to slipstream

Hello all - I am new to this site and a novice when it comes to this sort of thing. Just wondering if someone can lend me a hand on slipstreaming. The batch file xpsp2.cmd (updated 24-Aug-07) gives me the error message 'and' is not recognized as an internal or external command, this occurs after all the files have been downloaded - I downloaded the files to the default folder specified in the 'cmd' job. I am also not too sure how to slipstream the files from the desktop to a CD or DVD. Any assistance would be more than gratefully appreciated.

here's how I did it: 1. save

here's how I did it:

1. save wget.exe to your C:\WINDOWS file
2. at the top of the smithii page right click the "xpsp2.cmd" file and "save link as" onto your desktop
3. make sure your xp install disk is in your drive
4. double click the xpsp2.cmd to bring up the command line prompt (is that what it's called?)
5. when it asks you to set the directory path, enter "C:xpsp2" (this is what I used, drive name may vary)
6. it should automatically do its thing (download/automatically slipstream critical updates and sp2 if needed)
7. I used nlite to create the iso image and customise the install, be sure to direct it to the "xpsp2" directory with your slipstreamed windows files
8. after the iso was created with nlite, I used "img burn", a freeware program, to burn the iso to disk

all this took 30 min maybe, mostly fiddling with wget.......good luck to you, hope this helps

Workaround for 'and' error

I had the error message about trying to recognise "and" as a command as well; it's probably because you're running the script in somewhere under your 'Desktop' or 'My Documents', both of which live in a folder called 'C:\Documents and Settings' - I think somewhere in the script something's not got the right number of quote marks round it, so Windows thinks there are multiple parts, called 'C:\Documents', then 'and', then 'Settings\Some_username\My', etc etc.

Rather than working out how to fix it, I just moved everything I'd got so far to a new folder called 'C:\xp_image' and it worked fine. Maybe the instructions should be updated to advise this (specifically, run somewhere with no spaces in the path!)

Obviously, it would be nicer to just fix the bug, but that kind of thing can be tricky. I suspect the offending line is this one, but I'm not quite sure what's wrong with it:

start "Integrating %%a..." /wait "%%a" /integrate:"%builddir%" %options%

Minor Error in xpsp2.cmd ("and" error)

Ross,

I have found a small error that causes the "and" problem...A few lines from the bottom there is a line that reads:
if not exist %svcpackdir%\!kb!.cat (
it should read:
if not exist "%svcpackdir%"\!kb!.cat (

By not including the quotes around the %svcpackdir% you get the error described above. The parser thinks the second word in the directory string is a command. The quotes allow the use of complex directory names.

By the way, nice script.

rodgerwheat

hey Ross

Hey Ross
Can you put IE7 to you script ?? or tell me how i do that ???
I have make a danish translation, will you have it. ??

//Michael

Michael,

I'm only including security hotfixes, sorry.

Ross

Can you help me with the IE7 and there hotfix to IE7 ???
Will you have the danish translate ??
Maybe you can or will make a choois to langura.

Sorry my bad english

Michael,

I would be happy to offer assistance, but I don't plan on adding IE7, or danish support to my scripts.

-Ross

Ross

Okay, hmmm can and will you make a .cmd file to me, where i can update the IE7 ???

Do you now when you new update will come out ???

//Michael

Something similar for 2003 and vista x32 and x64

I am currently trying to make life easier here in a corporate world where 6 different types of OSes are currently being used: XP, 2003, and Vista both x32 and x64 platforms. So far this works great for XP x32 but i am looking for a solution for all of these operating systems. Any suggestions? Thanks!

Kevin

Kevin,

I don't use those OS's so I have no need for what you are desiring.

Unless Microsoft has changed the way they slipstream, it should be relatively easy to modify xpsp2.cmd for each OS you list.

Steps

Could you give a couple of steps to start off modifying xpsp2.cmd for another OS. As of right now all i can see is that i need to change the downloads to be specific to the updates of the OS i am looking to slipstream. From there i do not know yet if there are steps to the process.

Kevin,

I'm not certain, but I would assume that Microsoft hasn't changed the method of slipstreaming, so all you have to do is change the download URLs, and comment out, or remove the code regarding the XP SP2 download.

If you want, you could post your progress here, and I can try to help you.

Next question

So here's my next question. How did you get the list of all the necessary hotfixes for WinXP?

Kevin,

That is an excellent question. Here's an example:

  1. Visit Microsoft Security Bulletin Search.
  2. Click on Microsoft security bulletin for August 2007
  3. Click on Cumulative Security Update for Internet Explorer (937143)
  4. Find the OS you are interested in. For example, for "Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2" you would click on link next to it labeled Microsoft Internet Explorer 6
  5. Click the button labeled "Download"
  6. Find the link labeled Start download.. Unfortunately, this link is not the actual download URL. Instead it redirects (HTTP status code 302) to the download URL. There are several ways to discover this URL. Using the command-line program curl, you could type:
    curl "http://www.microsoft.com/downloads/info.aspx?na=90&p=&SrcDisplayLang=en&SrcCategoryId=&\
    SrcFamilyId=f2f9fb69-0399-4df0-9f5b-8f42a130c581&u=\
    http%3a%2f%2fdownload.microsoft.com%2fdownload%2f3%2f1%2f5%2f315b9aee-\
    5018-47b6-b142-7c2c0fcd03de%2fWindowsServer2003-KB937143-x86-ENU.exe"
    

    Curl will respond:

    ...Object moved to <a href="http://download.microsoft.com/download/3/1/5/315b9aee-5018-47b6-b142-7c2c0fcd03de/\
    WindowsServer2003-KB937143-x86-ENU.exe">...
    

    That is the actual download URL. Copy and paste that URL into your custom xpsp2.cmd script.

Another way to discover the download URL, is using a download manager program, such as FlashGet, or GetRight.

Please note, I only include security related hotfixes, as there are over 100 non-security related hotfixes for Windows XP.

Having spent a few days

Having spent a few days trying to get this to work for Server 2003, I have to say that I respect much more what you did for XP. This is a lot of work and has pointed out to me glaring weaknesses that I have with basic scripting and parsing.
My hat is off to you and thanks for your hard work with the XP side of things.

Perfect.

This is exactly what i was looking for all day yesterday! This will help greatly. Thanks a ton. I will reply with my results.

I also am more focused on getting only the security updates more than anything.

Thanks

That was my last resort but it looks like that's what i will end up doing. I appreciate the time you put into making this for XP pro. It helps a lot! Thanks!

NEVERMIND!!!!

So i contacted the guy who gave me the "clan" xp disc. and he told me that he integrated IE7 into it.
And that was exactly the problem!
I tracked down a clean sp2 disc (with actual microsoft labeling this time!) and used that as a base then your script. Worked like a charm!
Everything is going great, thank you so much for keeping up to date with this script. Looks like many other people who were releasing post sp2 updates havnt released anything in a few months.

IE7 error

So i extract my xp cd- run your file, then burn. No modifications made to disc

Tried it in a virtual environment and on a real pc and got the same error each time.

Ie7 unexpectedly shut down. This happens the very second you attempt to open ie7 in any way possible.
Ran the windows repair command sfc /scannow -then ie7 opens for about 1/2 second then does the same thing. Cant get it to work at all..

No clue what to do at this point, the disc is useless as i cant even run the windows updates. any ideas?

BTW i used a previous release that included ie7 and had no issues whatsoever, its only with this recent release..

-ugzz

Access is denied.

I was having problems with "Access is denied." errors. Turns out that the downloaded files did not have "Read and execute" permissions for some reason. I tried this with multiple installations and users, and had the same issue each time.

Added a line near the end of the download subroutine to address this, and thought I'd share:

if not exist "%hotfixdir%\%rv%" goto :loop
cacls "%hotfixdir%\%rv%" /T /E /C /G %USERNAME%:F
goto :eof

The new line is "cacls "%hotfixdir%\%rv%" /T /E /C /G %USERNAME%:F", and it addressed my problem. Thought you might be interested in adding it to the current script (possibly after a test for the cacls binary, though it's standard with Windows XP SP0, so it SHOULD be there.)

eriko

Good idea. I'll add that to my next release.

I've written the batch file

The batch file xpsp2.cmd (updated 25-Jul-07) give some error?

'and' is not recognized as an internal or external command,

Where do you have the

Where do you have the xpsp2.cmd stored? Did you install Wget?
I did a quick search and the only "and" not commented out is in an echo statement. You might need to give us some more details b/c it works for me just fine. I did have to stumble alot, but I did get it working.

Need to make a updated Win XP OEM CD in other language (Spanish)

In first place, thank you for share all you work, is great!!!

I have a question:

Can I modify the script so it makes the updates from a Windows XP SP1 OEM CD in spanish
to make and updated spanish OEM Windows XP SP2, in a easy way (Replacing ENU by ESN, I think)?

Thank you in advance,

Mauro

WGA problem.

First off I want to say thanks for the update script it works great!

However I have two questions:

Although the WGA patch was released in KB905474, and it was excluded from the script, I'm still getting this Activation warming in Windows XP once I perform the slipstreamed WINXP installation. Is it in another update?

Also I'm using my original WINXP cd, for some reason it only accepts an OEM key. I tried using my work's VLK key so that I can mainstream my installations but it does not accept the key. Is there a reason why?

gennerr,

KB905474 is not a security related hotfix, so I don't include it. Ryanvm *does* include it, with many other non-security related updates. Perhaps it would serve your needs better.

I could be wrong, but I believe a VLK keys can only be used with "Windows XP Corporate", and OEM keys can only be used with "Windows XP OEM".

-Ross

Mauro,

If only it was that easy. Microsoft, in their infinite wisdom, changes the file path, as well.

Please see http://smithii.com/slipstream_xpsp2#comment-197 for the URLs you need.

-Ross

Error on run...

First of all... Thanks for making this great script. I have used it before and it has worked great. However, when downloading and running your latest version (July 20, 2007) I receive an error when running it.

C:\Downloads>xpsp2.cmd
The syntax of the command is incorrect.

I looked at the script source and everything (as far as I can tell) looks okay. I even filled in the various paths in the script source and still no luck. Any ideas?

Thanks,
Jim

jneff,

Fixed. My bad. Sorry.

The syntax of the command is incorrect

Hi there, great idea for the script.. having the same problem as jneff, any update on this. When i run xpsp2.cmd. getting the same sytax error.

I've put it in the root of c: with the wget.exe. Anything i'm missing.

Regards
Steve

update

This update was released on July 10, 2007

http://download.microsoft.com/download/e/f/5/ef55d3c1-6f01-4a96-99ca-5b5bdabe2509/WindowsXP-KB939373-x86-ENU.exe

Also, was wondering why Media Player 9/10 updates were already included ???

Also, is there a guide to slipstream MS Office with the latest updates -> to be customised by ork.exe later. This is to deliver a customised installation which includes the latest hotfixes/updates.

Riyaz

Existing SP2 on source files?

I have an XP disk that's already been patched with SP2. Will using it as the source for these scripts cause any problems, or will it ignore it, or do something equally benign?

And wow, thanks for a great timesaver!

- Colin

cef,

The script will not download or apply the SP2 patch, if it has already been applied.

Well, the script will not

Well, the script will not download or apply the SP2 patch if a file called win51ip.SP2 exists.

My CD contains no such file, but I've installed with it before, and it does in fact have SP2 slipstreamed already.

So, the xpsp2.cmd script winds up downloading and running the SP2 exe, and it seems to be alright. I'm just wondering if anyone has a definitive answer as to what the exe file does when it re-slipstreams SP2. It gave me an error on one attempt, when the SP2 exe just crashed. I think that was fluke though. My most recent attempt seemed to work. But, like I say, I'd like to know, just in case it's known to cause problems.

cef,

I just assumed a file named WIN51*.SP2 would exist. Can you determine if there is another file that is unique to SP2 that we can look for? Perhaps I386\sp2.cab?

xpsp2.cmd hanging up on KB923689-x86-ENU.exe

xpsp2.cmd hanging up on KB923689-x86-ENU.exe using wget.exe

How do i fix this?

Thank you

in4ni2,

Please download the latest version and try again. Microsoft updated the URL (see the following post).

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
DeutschEspañolFrançaisItalianoNederlandsPortuguêsΕλληνικάРусскийالعربية中文(简体)中文(繁體)日本語한국어
 
Donate Bitcoins
Google
 
www smithii.com
 
Special thanks to Riester Rente Online for a generous donation!