Information
By default the system logging daemon, syslogd, listens for log messages from other systems on network port 514/udp. Unfortunately, the protocol used to transfer these messages does not include any form of authentication, so a malicious outsider could simply barrage the local system's syslog port with spurious traffic either as a denial of service attack on the system, or to fill up the local system's logging file systems so that subsequent attacks will not be logged.