Our server (windows 2008 R2 server, fully patched) this morning was a bit slow.
Checking network activity I found several DNS sessions using quite a lot of bandwidth (10MB/sec per session). This was rather suspicious (I expect DNS traffic to be light) so I turned off DNS for the present.
Here is an image of some of the connections:
As you can see there is a varied list of hosts. Is this a vulnerability in DNS?
Could be someone using TCP over DNS to get over some internet restrictions. You can counter this by implementing split horizon DNS.
There is an interesting Q about this, over at Security.SE