A remote attacker is able to use a specially crafted input to crash an application that is using zlib or potentially execute arbitrary code on the affected host.