To laugh at Microsoft educating administrators about patching boxes is just plain wrong IMO. Microsoft had a very valid point when they said recently that they believed that full disclosure was hurting them in terms of security. It is a basically provable fact that a large number of the hardest-hitting worms over the last two years have resulted from full-disclosure of vulnerabilities.
Full disclosure is what makes OS's more safer then they were just a few years ago. MS saying full disclosure is hurting them is marketing BS and an attempt to point the finger at other people.
Security professionals for the most part are professionals. They rely on there reputation for business and releasing vunerabilities before patches are avaible hurts them as much as everybody else. The idea that they do it for sensationalism is mostly false, except for the fact that they at least want credit for their work.
You see for a long time these people tried to point out and get patches for problems. Most large software vendors were guilty of ignoring problems, MS was just a big fish that was habituatlly bad behaving. Other companies like Sun had some of the longest running un-fixed vunerabilities.
So once they told these companies these problems existed, they just waited for patches that never came.
So exasperated they simply started publishing details.
Then they had to contend with threatening lawsuites and accuasations from big companies (who don't want to admit to publishing faulty software and then not fixing it for months, even years, after it had a known problem), so in self defense and to remain creditable they had to start publishing "proofs of concept" code that system adminstrators could use to test out their servers to see if they were vunerable.
Personally I have used theses things in to break out of a chroot jail, I even did it once to fix a issue that I was having with a computer's OS that I was installing remotely over the internet.
Tools like Nessus use these tools to help administrators do detailed audits of their networks and systems to improve security.
You see once people started publishing this data, thats when companies like MS started responding to security issues. Before that there attitude was "If nobody knows it's a security issue, then it's not a security issue."
If you want to look up worms and stuff you'd notice that in 95% of the cases, and especially big worms, that MS was notified months in advance that people were going to publish details of the vunerabilities, MS and whatever security group negotiated a resonable time frame for a patch and then after MS released the patch for a while, then these people reported their findings.
If MS seemed like they were dragging their feet, then they would release details anyways.
Mostly it's lazy or unedicated administrators and users that are the cause of most viral and worm outbreaks.
Full disclosure is a nessicary evil, and has a proven track record of getting people fixes and resolving issues before they become real issues.
Remember that worms just immitate (badly) basic steps a human goes thru to exploit a vunerability, anybody that gets nailed with a worm would probably just as easily get nailed by a cracker.
The difference is that a cracker can cover his tracks, while most worms don't.
(oh and MS DEFINATLY isn't the only one guilty of dragging their feet or ignoring issues. Sun, Apple, IBM and most any other major software manufacturer was guilty of it, most times they were guilty several times. For instance Sun was famous for not releasing patchs for some issues that were known for years in a couple cases)