This indicates an attempt to download an obfuscated Rich Text Format file.
This signature detects obfuscated RTF files. RTF exploits can be and are often highly obfuscated. An attacker can launch exploits by tricking an unsuspecting user into opening a malicious RTF file and execute arbitrary code within the context of the application, via a crafted RTF file.
RTF compatible document processor
System Compromise: Remote attackers can gain control of vulnerable system.
Update to the latest version from the vendor.