Today, about a day after the specific details of the DNS vulnerability were released, exploit code that makes it possible to pollute DNS cache with malicious records has been added to the Metasploit security tool. That announcement is available here.
From the description of the exploit code bulletin:
This exploit targets a fairly ubiquitous flaw in DNS implementations which allow the insertion of malicious DNS records into the cache of the target nameserver. This exploit caches a single malicious host entry into the target nameserver. By causing the target nameserver to query for random hostnames at the target domain, the attacker can spoof a response to the target server including an answer for the query, an authority server record, and an additional record for that server, causing target nameserver to insert the additional record into the cache.
How many days before we learn of major sites being attacked?