Recently at the CanSecWest conference in Vancouver a fundamental design flaw in the IPv6 protocol was exposed. The problem lies in the routing header 0 of an IPv6 packet which lets the sending party control the path of a packet, which is potentially very dangerous (for further analyses of the problem see the paper from CanSecWest here).
Basically, they've gotten bit by the [loose] source routing vulnerability again. People abused it in IPv4, why think that they wouldn't in IPv6? Looks like it's just one more thing to add to the default filter set on your firewall/edge device.