According to our source, this buffer overflow has been exploited for the past month and a half. The exploit code has been posted publicly, which is likely to increase the number of attempted exploits.
Administrators should set permissions on the Icecast server so that it is not run as root. This is a serious vulnerability, and the patch should be applied as soon as it becomes available.
A temporary workaround, which requires editing the source file and recompiling the code, has been provided. Users should be cautious when applying the workaround because it has not been verified by the vendor and is not supported.