Hi @Wolfgang,
I always use SNORT signatures/rules in these cases when there are no manufacturer signatures.
Most of the time you can extract some good ASCII signatures from the exploit code. Then you can create a SNORT signature and import it via the SmartConsole. This is not so easy most of the time but works quite well.
I always try to extract signatures from metasploit,... or other tools.
More information on how to import SNORT signatures can be found here:
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics...
But as @_Val_ said, in this case the attack vector is local so a Snort signature is useless.
➜ CCSM Elite, CCME, CCTE ➜ www.checkpoint.tips