Patches and Service Packs

Windows XP SP2 Patches


You should consider installing Service Pack 2 as soon as possible

On August 9, 2004, Microsoft released SP2 for Windows XP. SP2 is the latest collection of updates for Windows XP.

Download Windows XP SP2 Network Installation (266mb)

See the Windows 2000/XP SP Slipstreaming page for info on how to integrate SP2 into your existing media.

Required Patches

Windows XP Home or Professional with Service Pack 2 requires the following security-related patches:

Sponsored Content

What is “Inside Microsoft Teams”?

“Inside Microsoft Teams” is a webcast series, now in Season 4 for IT pros hosted by Microsoft Product Manager, Stephen Rose. Stephen & his guests comprised of customers, partners, and real-world experts share best practices of planning, deploying, adopting, managing, and securing Teams. You can watch any episode at your convenience, find resources, blogs, reviews of accessories certified for Teams, bonus clips, and information regarding upcoming live broadcasts.

Make sure you read Internet Explorer 6.0 SP1 Patches and IIS 5.1 Patches before you go on.

October 2005

MS05-051 : Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution (902400)

MS05-050 : Vulnerability in DirectShow Could Allow Remote Code Execution (904706)

MS05-049 : Vulnerabilities in Windows Shell Could Allow Remote Code Execution (900725)

MS05-048 : Vulnerability in the Microsoft Collaboration Data Objects Could Allow Remote Code Execution (907245)

MS05-047 : Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege (905749)

MS05-046 : Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution (899589)

MS05-045 : Vulnerability in Network Connection Manager Could Allow Denial of Service (905414)

August 2005

MS05-043 : Vulnerability in Print Spooler Service Could Allow Remote Code Execution (896423)

MS05-042 : Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing (899587)

MS05-041 : Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (899591)

MS05-040 : Vulnerability in Telephony Service Could Allow Remote Code Execution (893756)

July 2005

MS05-036 : Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution (901214)

June 2005

MS05-033 : Vulnerability in Telnet Client Could Allow Information Disclosure (896428)

MS05-032 : Vulnerability in Microsoft Agent Could Allow Spoofing (890046)

MS05-031 : Vulnerability in Step-by-Step Interactive Training Could Allow Remote Code Execution (898458)

MS05-027 : Vulnerability in Server Message Block Could Allow Remote Code Execution (896422)

MS05-026 : Vulnerability in HTML Help Could Allow Remote Code Execution (896358)

April 2005

MS05-019 : Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service (893066)

MS05-018 : Vulnerability in Windows Kernel Could Allow Elevation of Privilege and Denial of Service (890859)

MS05-016 : Vulnerability in Windows Shell that Could Allow Remote Code Execution (893086)

February 2005

MS05-015 : Vulnerability in Hyperlink Object Library Could Allow Remote Code Execution (888113)

MS05-013 : Vulnerability in the DHTML Editing ActiveX Control could allow code execution (891781)

MS05-012 : Vulnerability in OLE and COM Could Allow Remote Code Execution (873333)

MS05-011 : Vulnerability in Server Message Block Could Allow Remote Code Execution (885250)

MS05-010 : Vulnerability in the License Logging Service Could Allow Code Execution (885834)

MS05-009 : Vulnerability in PNG Processing Could Lead to Buffer Overrun (890261)

MS05-004 : ASP.NET Path Validation Vulnerability (887219)

January 2005

MS05-001 : Vulnerability in HTML Help Could Allow Code Execution (890175)

December 2004

MS04-045 : Vulnerability in WINS Could Allow Remote Code Execution (870763)

MS04-044 : Vulnerabilities in Windows Kernel and LSASS Could Allow Elevation of Privilege (885835)

MS04-043 : Vulnerability in HyperTerminal Could Allow Code Execution (873339)

MS04-041 : Vulnerability in WordPad Could Allow Code Execution (885836)

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by:

 
Office 365 Coexistence for Mergers & Acquisitions: Don’t Panic! Make it SimpleLive Webinar on Tuesday, November 16, 2021 @ 1 pm ET

In this session, Microsoft MVPs Steve Goodman and Mike Weaver, and tenant migration expert Rich Dean, will cover the four most common steps toward Office 365 coexistence and explain the simplest route to project success.

  • Directory Sync/GAL Sync – How to prepare for access and awareness
  • Calendar Sharing – How to retrieve a user’s shared calendar, or a room’s free time
  • Email Routing – How to guarantee email is routed to the active mailbox before and after migration
  • Domain Sharing – How to accommodate both original and new SMTP domains at every stage

Aimed at IT Admins, Infrastructure Engineers and Project Managers, this session outlines both technical and project management considerations – giving you a great head start when faced with a tenant migration.the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

Sponsored by: