I think all of us here know how wrong that is. A password isn't going to stop people for long. It was a matter of time until it got out. Maybe it already had, and we didn't know it.
That site lets you enter a password and see how long it would take to crack using a brute-force scenario. Assange's 58-character password would apparently take "16.40 million trillion trillion trillion trillion trillion trillion trillion centuries", assuming one hundred trillion guesses per second (which is far more computing power than is presently available to anybody in the world).
Cryptography relies on strong passwords. Assuming that the password wasn't deliberately given out, a 58-character password is going to be secure for a very very long time.
Sure, today they couldn't crack it... But this data has ramifications for many years to come. It should never have been gathered together and put in a public place.
Behind the government's firewalls, it was protected by an ever-changing system. If things get easier to crack, they can upgrade it. As a simple file, it can never be changed. It will also be there.
And finally, security experts will tell you that one of the easiest ways to crack something is the human factor. That password is written down somewhere, and wikileaks isn't a fort. Hackers could have gotten that password from wikileaks without them knowing.
So no, I don't think I do underestimate it.