- When calling the CBasePin.ReceiveConnection function the value that is returned is VFW_E_INVALIDMEDIATYPE (0x80040200)
KB 2670838 for Windows 7 SP1 updates the DirectShow subsystem with same changes.
- Verify AM_MEDIA_TYPE structure for invalid values. This structure describes the format of a media sample.
- When calling CMediaType.AllocFormatBuffer to allocate memory for the format block, make sure you are passing correct size required for the format block.
Please note: this method updates the cbFormat and pbFormat members of the AM_MEDIA_TYPE structure.
- Verify BITMAPINFOHEADER structure for invalid values
- Make sure biSize is equal to sizeof(BITMAPINFOHEADER)
- Verify biSizeImage for bad value (i.e. > 0x40000000)
- Verify biClrUsed for bad value (i.e. > 256)
GraphEdit is available in the Microsoft Windows Software Development Kit (SDK) (http://go.microsoft.com/fwlink/p/?linkid=62332).
Step 1. Go to Bin folder of the Windows SDK and run graphedt.exe.
Step 2. From the Graph menu, click Insert Filters. A dialog box appears with a list of the filters on your system, organized by filter category.
Step 3. Find your filter under the appropriate category (usually found under DirectShow Filters category) and click on Insert Filter button. If your filter is not a source filter then make sure you have added required source filter for it.
Step 4. Insert the required downstream filter.
Step 5. After you have added the filters, you can connect two filters by dragging the mouse from one filter's output pin to another filter's input pin. If the pins accept the connection, GraphEdit draws an arrow connecting them. Try this for your filter with the downstream filter. You will see -
- Input pin and output pin will connect without any error on Windows 7 SP1.
- GraphEdit will show you error message on Windows 8 and Windows 7 SP1 with KB 2670838 installed.
A buffer overflow occurs when we try to fit more data into a buffer than was allocated. A buffer overflow can be used to execute malicious code in a system.
A buffer overrun is essentially caused by treating unchecked, external input as trustworthy data. The act of copying this data, using operations such as CopyMemory, strcat, strcpy, or wcscpy, can create unanticipated results, which allows for system corruption.
ID do Artigo: 2841589 - Última Revisão: 24/04/2013 - Revisão: 1