Just patched a number of our nameservers. ( http://www.doxpara.com/ ). Be careful that it's not your content nameservers that matters here, but your own resolver and upstream's nameservers that matters. Check with the tool in www.doxpara.com. Ingenius way to check for vulnerablity, btw.
If you don't trust your upstream's dns, run your own patched nameserver, but don't forward queries upstream, but straight to the root servers.
P.S. Use opendns or our own patched dns: 126.96.36.199 (temporary while upstream patches their's. I'll remove this in a bit)