Skip navigation
McAfee Secure sites help keep you safe from identity theft, credit card fraud, spyware, spam, viruses and online scams
400 Views 1 Reply Latest reply: Jun 25, 2013 11:04 AM by wwarren RSS
kathr2012 Newcomer 1 posts since
Aug 22, 2012
Currently Being Moderated

Jun 25, 2013 10:24 AM

Gem Authenticate error with VSE8.8

We use Gem Authenticate software to validate the users smartcards when accessing our PAS system this works with Virus Scan Enterprise 8.5 but this product is end of life so we need to upgrade to Virus Scan Enterprise 8.8 but this seems to cause an error with the Gem Authenticate software when you put the smartcard in the reader, we are then unable to open the PAS software.

 

The error is 'GemAuthenticate Client Service has encountered a problem and needs to close. We are sorry for the inconvenience.'  When clicking on the error report - AppName: gacservice.exe Appver: 5.2.7.1.

 

Even when taking the action to disable - Access protection, Buffer overflow protection, On-Delivery Email Scanner and On-Access Scanner on McAfee v8.8 the GemAuthenticate software still comes up with an error before iPM PAS software is opened. Please see attached screen shots.

 

Does anyone have an ideas or information on how to tackle this issue?

Attachments:
  • wwarren McAfee SME 774 posts since
    Nov 3, 2009
    Currently Being Moderated
    1. Jun 25, 2013 11:04 AM (in response to kathr2012)
    Re: Gem Authenticate error with VSE8.8

    Hopefully the experience of others will help you, but I can answer from a McAfee perspective...

     

    When 3rd party apps exhibit symptoms due to the presence of our software, it is more likely to be a coding problem within the 3rd party that's being exposed by our "newer" code.

    There are various scenarios where installing our software might exhibit problems in another's software - let me cite a couple common examples:

    - they use a legacy filter driver and relied on load order, but the OS provides them no such guarantee for load order

    - they use an API having credentials provided which gets processed by the kernel in a manner where credentials are not passed on, and we enforce an Access check to avoid propagating a vulnerability

     

    There is little point for us to research those symptoms because we can only look at what our software is doing, and of course we'll see that it's not doing anything abnormal. The "Why" behind the 3rd party failing can only be deciphered by the vendor. And if they tell you "It's because McAfee is installed" you should slap them and say "look harder!" because they need to provide a technical analysis, not a circumstantial one.

More Like This

  • Retrieving data ...

Bookmarked By (0)

Legend

  • Correct Answers - 5 points
  • Helpful Answers - 3 points