darkrats said:
The original untouched updates are available only to customers who
run POSReady 2009 (Windows XP Embedded). If you're not running that
operating system, you will not see those updates.
POS - Point Of Sale (ie - cash registers, bank teller consoles, etc)
http://www.msfn.org/board/topic/171814-posready-2009-updates-ported-to-windows-xp-sp3-enu/
But before you get too excited, read post #20 (and beyond) in that
thread.
This might not be ready for prime time - yet.
I told you that there would be a way for these XP updates to be modded
and leaked to the web. Every PatchTuesday this is going to happen.
=================
The latest Patch tuesday updates have been easily ported to a Windows XP
virtual system - fully updated until April 2014.
The constraints are entirely artificial. Porting is easy as 1-2-3:
1. Modify update.inf file and remove the
condition=CompositeOp,OrOp,Prereq.XPInstallEmbedded.Section line from
the Prerequisite section.
2. Use a patched update.exe version 6.3.13.0 or later to accept the
modified update.inf file.
3. Compress to SFX EXE file. Delta compression optional.
I have already uploaded the files at RyanVM.net...
So Windows XP can have semi-official support until 2019! :w00t:
The update is applicable to Windows XP x64 SP2 if you remove the:
Condition=AndOp,Prereq.XPAMDInstallBlock.Section
line from the [Prerequisite] section and patch the update.exe file to
accept the modified update.inf. Instructions can be found here:
http://www.ryanvm.net/forum/viewtopic.php?p=115464#115464
The shlwapi.dll file is not an exclusive Server 2003 x64 component. In
addition there are registry keys in the INF file specific for XP
Professional x64:
[ProductInstall.ProfessionalFiles]
AddReg=Product.Add.Reg.Professional
[Save.Reg.For.Uninstall]
HKLM,SOFTWARE\Microsoft\Updates\Windows XP Version
2003\SP%SERVICE_PACK_NUMBER%\%SP_SHORT_TITLE%
[Product.Add.Reg.Professional]
HKLM,SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Hotfix\%SP_SHORT_TITLE%,"Comments",0,%SP_TITLE_XP%
HKLM,SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Hotfix\%SP_SHORT_TITLE%,"Fix
Description",0,%SP_TITLE_XP%
HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\%SP_SHORT_TITLE%,"RegistryLocation",0,"HKLM\SOFTWARE\Microsoft\Updates\Windows
XP Version 2003\SP%SERVICE_PACK_NUMBER%\%SP_SHORT_TITLE%"
HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\%SP_SHORT_TITLE%,"ParentDisplayName",0,"%PARENT_DISPLAY_NAME_XP%"
HKLM,SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\%SP_SHORT_TITLE%,"DisplayName",0,"%SP_TITLE_XP%"
HKLM,SOFTWARE\Microsoft\Updates\Windows XP Version
2003\SP%SERVICE_PACK_NUMBER%\%SP_SHORT_TITLE%,"Description",,%SP_TITLE_XP%
and the relevant strings.
All these observations indicate that the update is applicable to XP x64
without any issues (It's not proved completely - that would require an
analysis of the patch itself, something rather difficult and not
required in this scenario).
One final note: Because these updates have been deployed on a relatively
limited number of machines (XP support has officially ended and most
users ignore the existance of these updates) testing any of them in VM
before deploying to real hardware is strongly recommended.
-----------------
With reference to this:
http://www.microsoft.com/en-us/download/details.aspx?id=42774
which is related to this kb:
http://support.microsoft.com/kb/2932079
This update resolves a vulnerability in the Microsoft .NET Framework
that could allow elevation of privilege if an unauthenticated attacker
sends specially crafted data to an affected workstation or server that
has the .NET Framework Remoting feature enabled.
it is IMHO not a patch for a vulnerability, it is a patch for generic
stupidity.
-----------------
First of all, thank you *very much* harkaz, this is beyond cool! Heading
home from work yesterday I was almost a bit giddy seeing these
semi-official patches and thinking of all the future ones that
could/will be coming our way through 2019!
Let the idiots on neowin storm off in a huff! Tell them to come back in
2019.
For myself, I only get 1 patch out of the deal (I don't have IE or any
version of "dontnet" installed). Hmm, I didn't think about POS not
having IE6. Looks like we won't get any IE 6 patches unless somebody
ports them from 2003.
Jaclaz, I agree it's a patch for general stupidity-let's hope MS
doesn;'t start patching for that, as we'll all need petabyte sized
drives.
(Seriously though, the link to the bulletin 42774 that you posted; under
'System Requirements' it states that Windows XP is a "supported
operating system" along with Windows Server 2003. But the title at the
top of the page for 42774 just says Windows Server 2003.)
Rest assured the IE6 and the IE7 patches for POSReady 2009 also exist!
I'm sure harkaz'll release modded versions of them soon, too.
----------------
The patched update.exe seems to have done the trick. The update
installed and is actually listed in my list of updates as a "Windows XP"
update! I guess Microsoft isn't going to let anyone on XP x64 install it
the easy way unless they have paid support, though. I know there's a
risk to doing this, but this isn't a mission-critical machine, anyway.
Just a laptop I use when I'm away from the big iron, to go online and
stuff with. If it were, I'd just update it to 7. Guess I'll just keep
doing this once a month until July of next year. Thanks for the help!
There is also the older WEPOS/XPe which comes with IE6 and is supported
until I think 2016 and also uses the same patches.