In this article we look at the vulnerabilities associated with enabling SQL Mail and look at ways to work around such security issues

Few of the Most Common Vulnerabilities Faced in SQL Server
- Since it does not only consider a query as a read only request but a valid SQL statement, a user can not only use it for obtaining information but also for processing insert, updating, deleting commands, and creating and modifying objects.
- The reply-to-sender approach of the feature does not make any attempt to verify the requester or to even check for necessary authorization. However, you can prevent this from happening by enabling authentication and authorization checks for SQL mail query, but this still won’t guarantee any integrity or confidentiality.
- The security of the feature is badly handled, and is based entirely on ignorance of the intruder. Therefore, an intelligent intruder, with the very basic knowledge of the mail accounts, can send a query to be implemented in the target database.
How can you Keep the SQL Server Email Vulnerabilities at Bay

A Word of Caution
SQL injection is another common technique used by hackers to get access to the database, it makes use of a trial-and-error method, by using web URLs to introduce modifications, and then gain access to the database. SQL Mail database as compared to SQL injections is easier to crack, and preferred more by the attackers, it is not as intensive and time consuming as SQL injections, therefore always ensure your accounts are protected and user authentication and authorization is enabled for the feature.
Author Introduction:
Victor Simon is President & Chairman of DataNumen, Inc., which is the world leader in data recovery technologies, including repair accdb corruption and sql recovery software products. For more information visit www.datanumen.com