A vulnerability in the BIND domain name system (DNS) software could give an attacker the ability to easily and reliably control queried name servers chosen by the most widely deployed DNS software on the Internet, according to new research presented at the Woot Conference in Washington D.C. today. Researchers uncovered a vulnerability in BIND s smoothed round trip time (SRTT) algorithm. SRTT algorithm helps BIND choose the resolver with the fastest response time for a particular query from a dynamic list of name servers.
Source: https://threatpost.com/bind-vulnerablilty-enables-dns-cache-poisoning-attack/101988/

