""ET EXPLOIT Ghostscript invalidcheck escape attempt""
SID: 2026085
Revision: 1
Class Type: attempted-user
Metadata: attack_target Client_Endpoint, created_at 2018_09_05, deployment Datacenter, signature_severity Informational, updated_at 2018_09_05
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: $HOME_NET
Destination Port: any
Flow: to_client,established
Contents:
-
Value: "legal"
-
Value: "restore"
-
Value: "currentdevice"
-
Value: "putdeviceprops"
Within:
PCRE: "/legal[^x7B]\x7B[^\x7D]restore/smi"
Special Options:
- file_data