The exploit on the evidently unpatched China Netcom DNS server takes advantage of misstyped domain names: ISP customers who strike a wrong character risk being redirected to a malicious Web site.
There are plenty of other indications that a storm of DNS exploits and exploit-attempts is beginning to gather force. E-mail security company Message Labs, for instance, has detected a more than 50 percent increase in what it describes as "suspicious DNS traffic" over the last few weeks.
Like everybody else, bMighty has been talking about the DNS problem for awhile, and the fact that we're still talking about unpatched DNS servers -- and especially unpatched servers at major ISPs -- indicates that we'll continue to do so for awhile yet.
Not sure about your own ISP's DNS server? There's a tester button on Dan Kaminsky's homepage that's worth a click. (He's added an experimental mail server test as well.)