May 11, · Installing thirdparty Virtualization software is safe (if you know what you are doing of course). The only problem that comes to my mind is that thirdparty (Virtualbox or VMWare) virtualization software requires turning of windows native virtualization (Hyper-V) which may affect you if you are using it (e.g. phone development in visual studio uses these). May 20, · VirtualBox is % safe, this program lets you download os (operating system) and run it as a virtual machine, that doesn’t mean that the virtual os is virus free (well depends, if you download windows for example, it will be like if you had a normal windows computer, there are viruses). The question is, am I safe when I run apps/browser within my VirtualBox or do some viruses/malware/spyware exist that can access my main Ubuntu system from Windows 7 or the other linux distro that runs inside VirtualBox?
May 03, · There are several options in Virtualbox and Windows XP that you can use to increase your safety: 1. Make sure that the VM cannot access any folders on . Yes, VirtualBox is completely safe to use with Windows You can run Windows 10 in VB on Windows You can also run various versions of Unix/Linux on Windows 10 VB. VirtualBox works the same on every platform I’ve used it on, and it works well. Unless there’s a security flaw in Virtualbox that allows you to break out of the VM (and you’ve not patched), then no. However, it’s worth remembering that if there’s any network connection between the two, there’s the possibility of it moving to the host, as it would move between normal machines on .
virtual machine – Can a virus from a VirtualBox VM affect the host computer? – Super User
Subscribe to RSS
linux – Is it safe to run everything from VirtualBox? – Unix & Linux Stack Exchange
Information Security Stack Exchange is a question and answer site for information security professionals. It only takes a minute to sign up. Connect and share knowledge within a single location that is structured and easy to search. How likely is it that Oracle can break out of the VM and “silently” gain root access to the underlying OS?
What precautions can be taken to minimize these threats? Are there any viable alternatives? I just put some opinions from this link :. If they wanted to include backdoors in VirtualBox, they would’ve closed the source a long time ago. Why would they spend time implementing a backdoor in open-source software that, if ever detected, would pretty much lead to everyone abandoning the software en masse?
Leaving it open allows potentially thousands of individuals to comb through different areas of the source as they look for bugs and compile it on their own. There are too many eyes on it for me to buy into the notion of backdoors being likely. Yes, it’s still possible. Anything is possible if you want to speak in technicalities. Yes it is possible but if the guest OS is installed in a TC container they need a backdoor also in TC before they are able to have access to the guest OS, and atm i dont think TC has backdoors, even if in these weeks some users are investigating about that.
If you can not trust your virtualisation software, you’re in deep trouble. As ali pointed out, Virtualbox is open source and you or anyone can inspect the code and see if such a thing is there. I haven’t seen a call home routine during my network scans so I do not think it is there.
And even if it would be as Ali also pointed out, if they are ever caught it would be a huge publicity nightmare and Oracle could risk their reputation and business in the server market that alone I think is motivation enough for them to never even try to implement something like that. This by no means is a solid answer I’d rather leave this as a comment than an answer, but I do not have the proper reputation.
Depending on the network settings of your VirtualBox, if someone somehow got control of your VirtualBox, they could possibly get into your router or other devices on your network depending on settings and situation.
Not to mention, if you are sharing folders with the VirtualBox, they could insert a malicious file and do some social engineering such as replacing a file in that folder with a file that looks similar same filename, icon, and file data , but is actually malware. Nevertheless, common sense tells us that if anyone were to gain access to our VirtualBox, there is the potential for real damage to be done. As for backdoors, Ali covered that excellently. Sign up to join this community.
The best answers are voted up and rise to the top. Stack Overflow for Teams — Collaborate and share knowledge with a private group. Create a free Team What is Teams? Learn more. Asked 6 years, 1 month ago. Active 6 years, 1 month ago. Viewed 19k times. Improve this question. Steve Dodier-Lazaro 6, 27 27 silver badges 45 45 bronze badges. Kameel Sumtor Kameel Sumtor 49 1 1 gold badge 1 1 silver badge 2 2 bronze badges. While I don’t think Virtualbox has any backdoors, have you thought about your host OS running it?
I assume you’re running Windows otherwise take a look at QEMU which is light-years ahead of Virtualbox , and there’s a possibility this OS is backdoored and thus can see and log everything you do in the VM. If you want a “secure” machine, just buy an used laptop in my country a good Thinkpad can be bought under bucks if you don’t mind the battery being worn out , depending on your requirements you may remove wireless hardware and the hard drive if you don’t need persistent storage and boot off a CD or USB stick with your anonymity-focused distro of choice.
That way you get full anonymity assuming the distro itself is good , without the risks of having a backdoored OS nor the performance impact of virtualization. You really are asking several questions in one, here. It would be better if you could separate the question about how a VM Monitor can control a virtualised OS from the question about whether and how a host OS can be affected by a userland VM Monitor.
The two discussions are too different for me to give a single answer and recommend any course of action. Also, it’s always a good idea to tell us more about your use case, since your question is about whether VirtualBox can be trusted for that specific use case. Add a comment. Active Oldest Votes. I just put some opinions from this link : If they wanted to include backdoors in VirtualBox, they would’ve closed the source a long time ago.
You can download the source, review it, and compile it yourself. Generally, yes, a backdoor is possible in any kind of software. Improve this answer. Ali Ali 2, 1 1 gold badge 12 12 silver badges 23 23 bronze badges. LvB LvB 8, 1 1 gold badge 25 25 silver badges 42 42 bronze badges. Sakamaki Izayoi Sakamaki Izayoi 7 7 bronze badges.
The Overflow Blog. State of the Stack Q2 Podcast Information foraging — the tactics great developers use to find…. Featured on Meta. Community Ads for Related Hot Network Questions. Accept all cookies Customize settings.