As per the Ubuntu security notice, the issue only affects `systemd-resolved` (this can be confirmed by looking at the patch fixing the issue). So a system which isn’t running `systemd-resolved` isn’t exposed, and stopping `systemd-resolved` is sufficient to prevent the attack.
This is the reason why the Debian tracker mentions “[stretch] - systemd (Minor issue, systemd-resolved not enabled by default)”, meaning that while Debian 9 does include the affected code, it’s a minor issue and won’t result in a security advisory. You can receive notification of the fix in Debian 9 or later by subscribing to the corresponding Debian bug.