The specification, known as the Type 0 Routing Header (RH0), allows computers to tell IPv6 routers to send data by a specific route. Originally envisioned as a way to let mobile users to retain a single IP for their devices, the feature has significant security implications. During a presentation at the CanSecWest conference on 18 April, researchers Philippe Biondi and Arnaud Ebalard pointed out that RH0 support allows attackers to amplify denial-of-service attacks on IPv6 infrastructure by a factor of at least 80.
The flaw resides in the fact that you can specify two specific addresses in the IPv4’s extended header. This could be used to bounce data between two computers, causing a DDoS. This is something that needs to be fixed prior to widespread adoption, as it’s not a difficult trick to pull off.
Source: The Register