You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 14, 2022. It is now read-only.
... where <font_name> and <font_file_path> – Text name of the font and path to the .TTF/.OTF font file.
The [options] can be:
--test – Just draw font characters and print file information without fuzzing.
--text – String that will be drawn during fuzzing using the specified font. By default - ASCII ñcharacters string in range 20h – 7Fh.
--noisy – Print detailed information about each fuzzing iteration.
--fix-crcs – Fix invalid checksums in specified font file without fuzzing.
EXAMPLE:
See Release\BrushScriptStd_Fuzzing.bat - you can run this scenario to start fuzzing with the Brush Script Std Regular font.
This fuzzer helps me to find remote (client-side) DoS 0day vulnerability in Windows kernel, with invalid decoding of 0x0d byte in the Type 2 Charstring Format Glyph, that drops ATMFD.DLL code into the infinite loop.