No sooner that an exploit is discovered, and the hackers are onto it. It seems that any service previously hit with a DoS attack may be the first port of call.
There's no workaround for the flaw, so administrators need to patch to stop attacks. Major Linux distributions including Red Hat, CentOS and Ubuntu have issued patches, but it is still up to admins to apply it and restart their BIND servers. BIND 9 DNS Software Flaw Being Exploited - Patch Your Systems [computerworld.com]
You can get the patch from here [
kb.isc.org...]