Exploits

FreeBSD rtsold 15.x Vulnerable to Remote Code Execution via DNSSL Flaw

2 min readSource: Exploit Database

Critical RCE vulnerability in FreeBSD rtsold 15.x (CVE pending) allows attackers to execute code via malicious DNSSL options in router advertisements.

FreeBSD rtsold 15.x Affected by Critical Remote Code Execution Vulnerability

Security researchers have identified a critical remote code execution (RCE) vulnerability in FreeBSD's rtsold daemon (version 15.x) that could allow attackers to execute arbitrary code on affected systems. The flaw stems from improper handling of DNSSL (DNS Search List) options in IPv6 router advertisements (RAs).

Technical Details

The vulnerability (CVE pending) exists in the rtsold daemon, which is responsible for managing IPv6 router solicitation and advertisement processes. When processing maliciously crafted DNSSL options in router advertisements, the daemon fails to properly validate input, leading to a buffer overflow condition. This can be exploited to achieve remote code execution with the privileges of the rtsold process.

Key technical aspects:

  • Affected Component: rtsold (Router Solicitation Daemon)
  • Vulnerable Versions: FreeBSD 15.x
  • Attack Vector: Malicious IPv6 router advertisements containing crafted DNSSL options
  • Impact: Remote code execution (RCE) with rtsold process privileges
  • Exploitation Requirements: Attacker must be on the same network segment as the target

Impact Analysis

This vulnerability poses a high risk to FreeBSD systems running version 15.x, particularly in environments where IPv6 is enabled and rtsold is active. Successful exploitation could allow attackers to:

  • Gain unauthorized access to affected systems
  • Execute arbitrary commands with elevated privileges
  • Potentially move laterally within a network
  • Compromise sensitive data or deploy additional malware

The requirement for the attacker to be on the same network segment limits the attack surface but does not mitigate the severity of the flaw, as local network-based attacks remain a significant threat vector.

Recommendations

Security teams and FreeBSD administrators should take the following steps:

  1. Apply Patches: Monitor FreeBSD security advisories for official patches and apply them immediately upon release.
  2. Disable rtsold: If IPv6 router solicitation is not required, consider disabling the rtsold daemon as a temporary mitigation.
  3. Network Segmentation: Isolate critical FreeBSD systems from untrusted network segments to reduce exposure.
  4. Monitor for Exploitation: Deploy network monitoring tools to detect anomalous IPv6 router advertisement traffic.
  5. Review IPv6 Configuration: Audit IPv6 configurations to ensure unnecessary services are disabled.

This vulnerability highlights the importance of robust input validation in network daemons, particularly those handling IPv6 traffic. Organizations relying on FreeBSD should prioritize remediation efforts to prevent potential exploitation.

Share