Remote log injection locks everyone out of your box
SSH Brute-Force Attacks are a constant nuisance and of course a potential security-thread. There are several methods to defend against such brute force attacks. One of them is to analyze the ssh-log for attack-patterns and block the attacking IP-Adresses.
In his article „Attacking Log analysis” Daniel B. Cid explains why Log Analysis, when not done properly, can add new security vulnerabilities and end up causing more harm than good.
For example, he shows how you can manipulate the ssh-log to so that the defence-programm locks out everybody.