""ET EXPLOIT Ghostscript invalidcheck escape attempt (SMTP)""
SID: 2026084
Revision: 1
Class Type: attempted-user
Metadata: attack_target SMTP_Server, created_at 2018_09_05, deployment Datacenter, signature_severity Major, updated_at 2018_09_05
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: $SMTP_SERVERS
Destination Port: 25
Flow: to_server,established
Contents:
-
Value: "legal"
-
Value: "restore"
-
Value: "currentdevice"
-
Value: "putdeviceprops"
Within:
PCRE: "/legal[^x7B]\x7B[^\x7D]restore/smi"
Special Options:
- file_data